{"title":"Novel Authentication and Secure Trust based RPL Routing in Mobile sink supported Internet of Things","authors":"B. Rakesh, Parveen Sultana H","doi":"10.1080/23335777.2021.1933194","DOIUrl":"https://doi.org/10.1080/23335777.2021.1933194","url":null,"abstract":"ABSTRACT In the modern era, prevalence of the Internet of Things (IoT) devices that have de facto protocol as IPv6 routing protocol for low power and lossy networks (RPL). Yet, RPL protocol is vulnerable to many attacks such as rank attack, password spoofing and more. To this end, most of the works have focused their research on securing the RPL-based IoT network. However, still there exist downsides such as high energy consumption, lack of effective authentication and high packet losses. Motivated by these preceding defects, this paper proposes the Novel Authentication and Secure Trust-based RPL Routing in Mobile sink-supported Internet of Things (SecRPL-MS). At first, SecRPL-MS performs a registration process where all IoT nodes in the network register themselves in the security entity. In this work, the frequent death of IoT nodes is alleviated through deploying mobile sink in the network. If any grid member (GM) node wants to transmit their data to the grid head (GH) node, then it must undergo authentication process. Secure routing is adopted in RPL by utilising the sail fish optimisation algorithm. Each GM node encrypts its sensed data using the prince algorithm before transmitting it to the GH node. The moving points are selected for the mobile sink using the Quantum Inspired Neural Network (QINN) algorithm. This proposed SecRPL-MS performance is evaluated using the Network Simulator 3 (NS3) in terms of the Packet Delivery Ratio (%), Delay (ms), Energy Consumption (mJ), Key Generation Time (ms) and Malicious Node Detection Accuracy (%). The proposed SecRPL-Ms outperforms 23% of malicious node detection accuracy when compared to existing systems, which represent the proposed SecRPL-MS system providing high security by mitigating the following attacks such as rank attack, Sybil attack, blackhole attack and man in the middle attack.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"116 1","pages":"43 - 76"},"PeriodicalIF":0.0,"publicationDate":"2021-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81152915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. A, Hiran Kumar Singh, SivaChaitanyaPrasad. M, JaiSivaSai. G
{"title":"RNN-LSTM Based Deep Learning Model for Tor Traffic Classification","authors":"V. A, Hiran Kumar Singh, SivaChaitanyaPrasad. M, JaiSivaSai. G","doi":"10.1080/23335777.2021.1924284","DOIUrl":"https://doi.org/10.1080/23335777.2021.1924284","url":null,"abstract":"ABSTRACT Tor is an anonymous browser software running on an overlay network. Due to the nature of the end-to-end encryption channel, it is hard to analyse the network traffic. Thus, intruders prefer the Tor browser to hide their identity and access the offensive content. Tor relays are secure from network monitoring, tracking and surveillance. There are so many research contributions for tracking the network traffic and classifying it based on various features and attributes. In this paper, we explained RNN-LSTM-based deep learning model to classify the network traffic based on their nature Tor/non-Tor. We have tested the model with open data sets ISCXTor2016 data sets and samples retrieved in our environment using CIC-flowmeter-4.0. The binary classification model using RNN-LSTM classifies the network traffic with better accuracy and precision. The same experiment conducted in the traditional deep neural network model provides large false positives and false negatives. Here we also present a detailed study and analysis of the model compare with ANN classifiers and genetic-based feature selection method.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"17 1","pages":"25 - 42"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76915241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suresh Chavhan, Joel J. P. C. Rodrigues, Ashish Khanna
{"title":"Computational intelligence paradigm for job shop scheduling and routing in an uncertain environment","authors":"Suresh Chavhan, Joel J. P. C. Rodrigues, Ashish Khanna","doi":"10.1080/23335777.2021.1879275","DOIUrl":"https://doi.org/10.1080/23335777.2021.1879275","url":null,"abstract":"ABSTRACT Computational Intelligence (CI) is a more efficient paradigm for solving real-world problems in uncertain conditions. The traditional CI approaches are not capable to provide the complete and sufficient solutions for problems. Therefore, new techniques are necessary to efficiently solve these issues seriously. New techniques, such as Emergent Intelligence (EI), Multi-Agent System (MAS), etc., provide robust, generic, flexible, and self-organised to solve complex real-world problems. In this paper, we discuss Emergent Intelligence (EI) and its uniqueness in solving problems in an uncertain environment. We also discuss EI, Swarm Intelligence (SI) and MultiAgent System (MAS)-based problem-solving in an uncertain environment and compared their performance. We have considered two different problems: job shop scheduling using EI and MAS and route establishment for routing using MAS, SI and EI in an uncertain environment. Each problem is categorically analysed and solved step by step using MAS, SI and EI in a dynamic environment. We measure the performance of these three methods by varying the number of agents, tasks and time. Performance measures are compared and shown to demonstrate the importance of EI over MAS and SI for solving problems in an uncertain environment.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"16 1","pages":"45 - 66"},"PeriodicalIF":0.0,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85042439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Chua’s chaotic circuit parameters using penguins search optimisation algorithm","authors":"F. Maamri, S. Bououden, I. Boulkaibet","doi":"10.1080/23335777.2021.1921038","DOIUrl":"https://doi.org/10.1080/23335777.2021.1921038","url":null,"abstract":"ABSTRACT In this paper, the Penguins Search optimisation (PeSOA) Algorithm is used to identify optimal control parameters of the Chua circuit. The PeSOA algorithm, which is one of the nature-inspired algorithms, is mainly based on the collaborative hunting concept of penguins. In this algorithm, each penguin individually starts its search process, then communicates its position and the number of fish found to his group. The main objective of this strategy is to synchronise dives among the group in order to achieve a global solution. In this paper, a PeSOA algorithm is adopted to explore the search space for locating the optimum intervals and identify the unknown Chua’s system parameters without any partial knowledge of the internal structure. The identified parameters, obtained by minimising the objective function between the estimated and the output values of the system, are used to obtain stable oscillations. The obtained results show that the PeSOA algorithm gives accurate results and the identified parameters produce a stable oscillation of Chua’s chaotic circuit.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"26 1","pages":"233 - 260"},"PeriodicalIF":0.0,"publicationDate":"2021-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87914559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiayu Dong, Meijiao Zhao, Min Cheng, Yue-ying Wang
{"title":"Integral terminal sliding-mode integral backstepping adaptive control for trajectory tracking of unmanned surface vehicle","authors":"Jiayu Dong, Meijiao Zhao, Min Cheng, Yue-ying Wang","doi":"10.1080/23335777.2021.1924285","DOIUrl":"https://doi.org/10.1080/23335777.2021.1924285","url":null,"abstract":"ABSTRACT The trajectory tracking method for an unmanned surface vehicle (USV) using integral terminal sliding mode integral backstepping adaptive control (ITSMIBAC) scheme is presented in this paper, which takes into account external disturbances and uncertain model parameters. Furthermore, finite-time convergence and excellent track tracking effect are guaranteed by the differential equations that is made up of the integral terminal sliding mode function. In particular, a backstepping method adding integral term is used to ensure the globally asymptotic stability of system and make the differential equations to converge to zero. The upper bound of the disturbances including external disturbances and uncertain model parameters is estimated by an adaptive control law. Finally, the effectiveness and the feasibility of the proposed controller are demonstrated by numerical example and comparison result through tracking circular orbit.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"59 1","pages":"77 - 96"},"PeriodicalIF":0.0,"publicationDate":"2021-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84260444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Zhang, Jin Huang, Yue Gao, Yau Liu, Yangdong Deng
{"title":"A hierarchical perception decision-making framework for autonomous driving","authors":"E. Zhang, Jin Huang, Yue Gao, Yau Liu, Yangdong Deng","doi":"10.1080/23335777.2021.1901147","DOIUrl":"https://doi.org/10.1080/23335777.2021.1901147","url":null,"abstract":"ABSTRACT Self-driving vehicles have attracted significant attention from both industry and academy. Despite the intensive research efforts on the perception model of environment-awareness, it is still challenging to attain accurate decision-making under real-world driving scenarios. Today’s state-of-the-art solutions typically hinge on end-to-end DNN-based perception-control models, which provide a rather direct way of driving decision-making. However, DNN models may fail in dealing with complex driving scenarios that require relational reasoning. This paper proposes a hierarchical perception decision-making framework for autonomous driving by employing hypergraph-based reasoning, which enables fuse multi-perceptual models to integrate multimodal environmental information. The proposed framework utilises the high-order correlations behind driving behaviours, and thus allows better relational reasoning and generalisation to achieve more precise driving decisions. Our work outperforms state-of-the-art results on Udacity, Berkeley DeepDrive Video and DBNet data sets. The proposed techniques can be used to construct a unified driving decision-making framework for modular integration of autonomous driving systems.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"14 1","pages":"192 - 209"},"PeriodicalIF":0.0,"publicationDate":"2021-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85108131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks","authors":"Mutaz M. Hamdan, M. Mahmoud","doi":"10.1080/23335777.2021.1916230","DOIUrl":"https://doi.org/10.1080/23335777.2021.1916230","url":null,"abstract":"ABSTRACT Cyber Physical Systems (CPSs) are defined as the integrations of computation, control, and communication to obtain a prespecified behaviour of the physical processes. Due to their nature, CPSs could be highly affected by security threats. In this research, a secure filter for discrete-time delayed nonlinear systems affected by the two major kinds of cyber attacks i.e. denial-of-service (DoS) and deception attacks is proposed. The cyber attacks are modelled as Bernoulli distributed white sequences with variable probabilities. First, a predefined level of security is guaranteed by setting a sufficient condition using the techniques of stochastic analysis. Second, we obtain the gains of the proposed filter by solving a linear matrix inequality using YALMIP and MATLAB/Simulink. Finally, a numerical example is solved to show the effectiveness of this method on CPSs.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"118 1","pages":"210 - 232"},"PeriodicalIF":0.0,"publicationDate":"2021-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88080349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Q-Learning Based Optimisation Framework for Real-Time Mixed-Task Scheduling","authors":"Tianchuang Meng, Jin Huang, Huiqian Li, Zengkun Li, Yu Jiang, Zhihua Zhong","doi":"10.1080/23335777.2021.1900922","DOIUrl":"https://doi.org/10.1080/23335777.2021.1900922","url":null,"abstract":"ABSTRACT Mixed periodic and aperiodic tasks with explicit deterministic or probabilistic timing requirements are becoming increasingly deployed in real-time industry control systems. Such systems pose significant challenges to the scheduling algorithms because the failure of scheduling can be catastrophic. In the past decades, significant research effort has been dedicated on the scheduling problems, and various scheduling algorithms were proposed to meet various system requirements and task loads. However, a single fixed scheduling algorithm usually cannot fully satisfy the requirements for a dynamic mixed-task-set, which is commonly found in modern complex real-time control systems. It is thus extremely hard for engineers to design a set of scheduling solutions to guarantee the correctness and optimality under all conditions. Aiming at optimising the scheduling performance in a real-time control system, this paper proposes a Q-learning-based optimisation framework to select proper scheduling algorithms for the mixed-task-set. Built on a three-layer perceptron network, our Q-learning framework is able to efficiently and effectively choose scheduling algorithms that dynamically adapt to the characteristics of task-sets. Experimental results using real-world data proved the effectiveness of the proposed framework.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"2 1","pages":"173 - 191"},"PeriodicalIF":0.0,"publicationDate":"2021-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84522637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimisation model of micro grid dispatching for smart building cluster based on blockchain","authors":"Sheng Zhao, Zhengtian Wu","doi":"10.1080/23335777.2021.1887365","DOIUrl":"https://doi.org/10.1080/23335777.2021.1887365","url":null,"abstract":"ABSTRACT With the rapid development of Chinese economy, the problem of building energy consumption is becoming more prominent. The application of distributed energy brings new solutions for building energy conservation. However, the traditional centralised aggregator approach has many disadvantages. This paper proposes an autonomous decentralized dispatching framework based on blockchain technology. The participating nodes can transfer and record data to each other through the established P2P energy blockchain network. The simulation result shows that the decentralized micro grid dispatching approach proposed in this paper canreduce the cost of distributed energy dispatching.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"115 12 1","pages":"138 - 171"},"PeriodicalIF":0.0,"publicationDate":"2021-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76900722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rail detection algorithm for accurate recognition of train fuzzy video","authors":"Bin Wang, Zhen Wang, Dou Zhao, Xuhai Wang","doi":"10.1080/23335777.2021.1879277","DOIUrl":"https://doi.org/10.1080/23335777.2021.1879277","url":null,"abstract":"ABSTRACT The research follows the mainstream physics and network system architecture. Aiming at the problem of poor data processing ability and poor robustness of traditional trajectory detection algorithms, a trajectory detection method that can be accurately extracted from the fuzzy video of a locomotive is proposed. Firstly, in order to ensure the accuracy of rail detection of trains in complex environments and improve the safety of driverless driving, the video image captured by on-board camera is stored as RGB video frame set, and then processed as single-channel greyscale image carrier set; Secondly, after the initial colour and brightness treatment, the redundant and useless noise features in the greyscale image carrier set still exist. After secondary Gaussian filtering and de-noising, canny operator is used to detect the track edge details of interest; Finally, the rail area is taken as the interested target for Hough line detection, the background subtraction method of adaptive mixed Gaussian background modelling is introduced, the structure element function and the morphologyEx theory of morphological transformation function are introduced, and the left and right tracks are fitted after the calculation and judgement of pixel coordinates. Algorithm for visual tracking experiments show that, rail detection algorithm has already meet need to detect rails in low-quality videos recorded by the on-board cameras of different models of trains at different speed. It not only can process large quantity of data from the on-board camera videos in real time, but also can accurately detect the target rails adaptively where rail conditions are complex with obstructive objects, which shows that this algorithm has very robust performance.","PeriodicalId":37058,"journal":{"name":"Cyber-Physical Systems","volume":"191 1","pages":"67 - 84"},"PeriodicalIF":0.0,"publicationDate":"2021-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75828781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}