EURASIP Journal on Information Security最新文献

筛选
英文 中文
Intelligent multi-agent model for energy-efficient communication in wireless sensor networks 无线传感器网络节能通信的智能多代理模型
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-04-08 DOI: 10.1186/s13635-024-00155-6
Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman, Habib Hamam
{"title":"Intelligent multi-agent model for energy-efficient communication in wireless sensor networks","authors":"Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman, Habib Hamam","doi":"10.1186/s13635-024-00155-6","DOIUrl":"https://doi.org/10.1186/s13635-024-00155-6","url":null,"abstract":"The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in military security applications. A multi-agent context-aware model employing the belief-desire-intention (BDI) reasoning mechanism is proposed. This model utilizes a semantic knowledge-based intelligent reasoning network to monitor suspicious activities within a prohibited zone, generating alerts. Additionally, a BDI intelligent multi-level data transmission routing algorithm is proposed to optimize energy consumption constraints and enhance energy-awareness among nodes. The energy optimization analysis involves the Energy Percent Dataset, showcasing the efficiency of four wireless sensor network techniques (E-FEERP, GTEB, HHO-UCRA, EEIMWSN) in maintaining high energy levels. E-FEERP consistently exhibits superior energy efficiency (93 to 98%), emphasizing its effectiveness. The Energy Consumption Dataset provides insights into the joule measurements of energy consumption for each technique, highlighting their diverse energy efficiency characteristics. Latency measurements are presented for four techniques within a fixed transmission range of 5000 m. E-FEERP demonstrates latency ranging from 3.0 to 4.0 s, while multi-hop latency values range from 2.7 to 2.9 s. These values provide valuable insights into the performance characteristics of each technique under specified conditions. The Packet Delivery Ratio (PDR) dataset reveals the consistent performance of the techniques in maintaining successful packet delivery within the specified transmission range. E-FEERP achieves PDR values between 89.5 and 92.3%, demonstrating its reliability. The Packet Received Data further illustrates the efficiency of each technique in receiving transmitted packets. Moreover the network lifetime results show E-FEERP consistently improving from 2550 s to round 925. GTEB and HHO-UCRA exhibit fluctuations around 3100 and 3600 s, indicating variable performance. In contrast, EEIMWSN consistently improves from round 1250 to 4500 s.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"37 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140582153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system FEDDBN-IDS:基于联合深度信念网络的无线网络入侵检测系统
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-04-04 DOI: 10.1186/s13635-024-00156-5
M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu, Durga Prasad Bavirisetti
{"title":"FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system","authors":"M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu, Durga Prasad Bavirisetti","doi":"10.1186/s13635-024-00156-5","DOIUrl":"https://doi.org/10.1186/s13635-024-00156-5","url":null,"abstract":"Over the last 20 years, Wi-Fi technology has advanced to the point where most modern devices are small and rely on Wi-Fi to access the internet. Wi-Fi network security is severely questioned since there is no physical barrier separating a wireless network from a wired network, and the security procedures in place are defenseless against a wide range of threats. This study set out to assess federated learning, a new technique, as a possible remedy for privacy issues and the high expense of data collecting in network attack detection. To detect and identify cyber threats, especially in Wi-Fi networks, the research presents FEDDBN-IDS, a revolutionary intrusion detection system (IDS) that makes use of deep belief networks (DBNs) inside a federated deep learning (FDL) framework. Every device has a pre-trained DBN with stacking restricted Boltzmann machines (RBM) to learn low-dimensional characteristics from unlabelled local and private data. Later, these models are combined by a central server using federated learning (FL) to create a global model. The whole model is then enhanced by the central server with fully linked SoftMax layers to form a supervised neural network, which is then trained using publicly accessible labeled AWID datasets. Our federated technique produces a high degree of classification accuracy, ranging from 88% to 98%, according to the results of our studies.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"301 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140602127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cancelable templates for secure face verification based on deep learning and random projections 基于深度学习和随机投影的安全人脸验证可取消模板
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-03-08 DOI: 10.1186/s13635-023-00147-y
Arslan Ali, Andrea Migliorati, Tiziano Bianchi, Enrico Magli
{"title":"Cancelable templates for secure face verification based on deep learning and random projections","authors":"Arslan Ali, Andrea Migliorati, Tiziano Bianchi, Enrico Magli","doi":"10.1186/s13635-023-00147-y","DOIUrl":"https://doi.org/10.1186/s13635-023-00147-y","url":null,"abstract":"Recently, biometric recognition has become a significant field of research. The concept of cancelable biometrics (CB) has been introduced to address security concerns related to the handling of sensitive data. In this paper, we address unconstrained face verification by proposing a deep cancelable framework called BiometricNet+ that employs random projections (RP) to conceal face images and compressive sensing (CS) to reconstruct measurements in the original domain. Our lightweight design enforces the properties of unlinkability, revocability, and non-invertibility of the templates while preserving face recognition accuracy. We compare facial features by learning a regularized metric: at training time, we jointly learn facial features and the metric such that matching and non-matching pairs are mapped onto latent target distributions; then, for biometric verification, features are randomly projected via random matrices changed at every enrollment and query and reconstructed before the latent space mapping is computed. We assess the face recognition accuracy of our framework on challenging datasets such as LFW, CALFW, CPLFW, AgeDB, YTF, CFP, and RFW, showing notable improvements over state-of-the-art techniques while meeting the criteria for secure cancelable template design. Since our method requires no fine-tuning of the learned features, it can be applied to pre-trained networks to increase sensitive data protection.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"64 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140075134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID tag recognition model for Internet of Things for training room management 用于培训室管理的物联网 RFID 标签识别模型
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-02-24 DOI: 10.1186/s13635-024-00154-7
Shengqi Wu
{"title":"RFID tag recognition model for Internet of Things for training room management","authors":"Shengqi Wu","doi":"10.1186/s13635-024-00154-7","DOIUrl":"https://doi.org/10.1186/s13635-024-00154-7","url":null,"abstract":"With the rapid development of the Internet of Things and intelligent technology, the application of Radio Frequency Identification (RFID) technology in training room management is becoming increasingly widespread. An efficient and accurate RFID system can significantly improve the management efficiency and resource utilization of the training room, thereby improving teaching quality and reducing management costs. Although RFID technology has many advantages, there are still some problems in practical applications, such as label collision and recognition of unknown labels. These issues not only affect the performance of the system but may also cause interference with actual teaching and management. This study proposes a grouping-based bit arbitration query tree algorithm and anti-collision technology to solve label collisions and reduce label recognition time in the technology. A new unknown label recognition algorithm is also proposed to improve the recognition efficiency and accuracy of identifying new unknown labels. Related experiments have shown that the recognition accuracy of the algorithm designed this time is 95.86%. Compared with other algorithms, the number of idle time slots is the smallest. When the number of queries is 1000, the algorithm has 1842 queries, and the communication complexity is the best. When the number of unknown tags is 10,000, the actual accuracy rate is 95.642%. Compared with traditional recognition algorithms, the new unknown label recognition algorithm has a smaller frame length in the same label proportion and good recognition performance. On a theoretical level, the research content on RFID technology helps to improve and develop the basic theories of the Internet of Things and intelligent recognition technology and provides solutions and application technologies for equipment management and IoT applications in training rooms. On a practical level, the research results can provide specific guidance for the management of training rooms, help solve equipment management and safety maintenance problems in practical applications, and improve the management efficiency of training rooms.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"8 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139957042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network security threat detection technology based on EPSO-BP algorithm 基于 EPSO-BP 算法的网络安全威胁检测技术
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-02-24 DOI: 10.1186/s13635-024-00152-9
Zhu Lan
{"title":"Network security threat detection technology based on EPSO-BP algorithm","authors":"Zhu Lan","doi":"10.1186/s13635-024-00152-9","DOIUrl":"https://doi.org/10.1186/s13635-024-00152-9","url":null,"abstract":"With the development of Internet technology, the large number of network nodes and dynamic structure makes network security detection more complex, which requires the use of a multi-layer feedforward neural network to build a security threat detection model to improve network security protection. Therefore, the entropy model is adopted to optimize the particle swarm algorithm to decode particles, and then the single-peak and multi-peak functions are used to test and compare the particle entropy and fitness values to optimize the weights and thresholds in the multi-layer feedforward neural network. Finally, Suspicious Network Event Recognition Dataset discovered by data mining is sampled and applied to the entropy model particle swarm optimization for training. The test results show that there are four functions for the optimal mean and standard deviation in this algorithm, with values of 5.712e − 02, 4.805e − 02, 4.914e − 01, 1.066e − 01, 1.577e − 01, 1.343e − 01, and 2.089e + 01, 5.926, respectively. Overall, the algorithm proposed in the study is the best. Finally, the detection rate of attack types is calculated. The multi-layer feedforward neural network algorithm is 83.80%, the particle swarm optimization neural network algorithm is 91.00%, and the entropy model particle swarm optimization algorithm is 95.00%. The experiment shows that the research model has high accuracy in detecting network security threats, which can provide technical support and theoretical assistance for network security protection.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"33 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139956255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment 物联网环境中基于改进的 R-LWE 算法的高效身份安全认证方法
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-02-22 DOI: 10.1186/s13635-024-00153-8
Lin Yang
{"title":"Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment","authors":"Lin Yang","doi":"10.1186/s13635-024-00153-8","DOIUrl":"https://doi.org/10.1186/s13635-024-00153-8","url":null,"abstract":"In recent years, various smart devices based on IoT technology, such as smart homes, healthcare, detection, and logistics systems, have emerged. However, as the number of IoT-connected devices increases, securing the IoT is becoming increasingly challenging. To tackle the increasing security challenges caused by the proliferation of IoT devices, this research proposes an innovative method for IoT identity authentication. The method is based on an improved ring-learning with errors (R-LWE) algorithm, which encrypts and decrypts communication between devices and servers effectively using polynomial modular multiplication and modular addition operations. The main innovation of this study is the improvement of the traditional R-LWE algorithm, enhancing its efficiency and security. Experimental results demonstrated that, when compared to number theory-based algorithms and elliptic curve cryptography algorithms at a 256-bit security level, the enhanced algorithm achieves significant advantages. The improved algorithm encrypted 20 data points with an average runtime of only 3.6 ms, compared to 7.3 ms and 7.7 ms for the other algorithms. Similarly, decrypting the same amount of data had an average runtime of 2.9 ms, as opposed to 7.3 ms and 8 ms for the other algorithms. Additionally, the improved R-LWE algorithm had significant advantages in terms of communication and storage costs. Compared to the number theory-based algorithm, the R-LWE algorithm reduced communication and storage costs by 3 °C each, and compared to elliptic curve cryptography, it reduced them by 4 °C each. This achievement not only enhances the efficiency of encryption and decryption but also lowers the overall operational costs of the algorithm. The research has made significant strides in improving the security and efficiency of IoT device identity authentication by enhancing the R-LWE algorithm. This study provides theoretical and practical foundations for the development and application of related technologies, as well as new solutions for IoT security.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139925994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved RFID mutual authentication protocol against exhaustive attack in the context of big data 大数据背景下针对穷举攻击的改进型 RFID 相互验证协议
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-01-31 DOI: 10.1186/s13635-024-00151-w
Kongze Li
{"title":"Improved RFID mutual authentication protocol against exhaustive attack in the context of big data","authors":"Kongze Li","doi":"10.1186/s13635-024-00151-w","DOIUrl":"https://doi.org/10.1186/s13635-024-00151-w","url":null,"abstract":"The development of big data has epromoted the development of Internet technology, but it has brought more network security and privacy problems. Therefore, how to solve network security problems is the main research direction of current network technology development. In order to deal with the harm of network attacks to personal privacy security, this paper studies and proposes an RFID mutual authentication protocol against exhaustive attacks based on improved Hash function, and proposes a security proof based on BAN logic rules. At the same time, to enhance the computing resources of the improved protocol, this paper proposes an improved authentication query protocol for multi-source RFID tags. In the performance analysis, when the distance between the reader and the tag reaches 10 m, the improved protocol can still be higher than 90%. The application test shows that the improved protocol proposed in the study is capable of resisting exhaustive attacks, its execution time is short, and it is less affected by the number of tags. The above results show that in the context of big data, the improved RFID mutual authentication protocol proposed by the research against network exhaustive attacks has a more significant defense effect, can effectively protect user privacy, and has a greater reference value in network security research.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"34 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139648741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on privacy and secure storage protection of personalized medical data based on hybrid encryption 基于混合加密的个性化医疗数据隐私和安全存储保护研究
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-01-02 DOI: 10.1186/s13635-023-00150-3
Jialu Lv
{"title":"Research on privacy and secure storage protection of personalized medical data based on hybrid encryption","authors":"Jialu Lv","doi":"10.1186/s13635-023-00150-3","DOIUrl":"https://doi.org/10.1186/s13635-023-00150-3","url":null,"abstract":"Personalized medical data privacy and secure storage protection face serious challenges, especially in terms of data security and storage efficiency. Traditional encryption and storage solutions cannot meet the needs of modern medical data protection, which has led to an urgent need for new data protection strategies. Research personalized medical data privacy and secure storage protection based on hybrid encryption, in order to improve the security and efficiency of data storage. A hybrid encryption mechanism was proposed, which uses user attributes as keys for data encryption. The results show that the storage consumption of user attribute keys increases with the number of user attributes, but the consumption of hybrid encryption privacy storage technology is much smaller than that of traditional schemes. In the test, when the number of users increased to 30, the processing time first reached 1200 ms. During the increase in data volume, both test data and real data showed a brief decrease in attack frequency, but after the data volume reached 730–780, the attack frequency increased. It is worth noting that the performance of test data is better than that of real data. Personalized medical data privacy and secure storage protection based on hybrid encryption can not only effectively improve data security and reduce the risk of attack, but also greatly outperform traditional solutions in storage consumption and processing time. It has important practical significance for modern medical data storage protection.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"34 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139083874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT devices and data availability optimization by ANN and KNN 利用 ANN 和 KNN 优化物联网设备和数据可用性
IF 3.6
EURASIP Journal on Information Security Pub Date : 2024-01-02 DOI: 10.1186/s13635-023-00145-0
Zhiqiang Chen, Zhihua Song, Tao Zhang, Yong Wei
{"title":"IoT devices and data availability optimization by ANN and KNN","authors":"Zhiqiang Chen, Zhihua Song, Tao Zhang, Yong Wei","doi":"10.1186/s13635-023-00145-0","DOIUrl":"https://doi.org/10.1186/s13635-023-00145-0","url":null,"abstract":"Extensive research has been conducted to enhance the availability of IoT devices and data by focusing on the rapid prediction of instantaneous fault rates and temperatures. Temperature plays a crucial role in device availability as it significantly impacts equipment performance and lifespan. It serves as a vital indicator for predicting equipment failure and enables the improvement of availability and efficiency through effective temperature management. In the proposed optimization scheme for IoT device and data availability, the artificial neural network (ANN) algorithm and the K-Nearest Neighbours (KNN) algorithm are utilized to drive a neural network. The preliminary algorithm for availability optimization is chosen, and the target is divided into two parts: data optimization and equipment optimization. Suitable models are constructed for each part, and the KNN-driven neural network algorithm is employed to solve the proposed optimization model. The effectiveness of the proposed scheme is clearly demonstrated by the verification results. When compared to the benchmark method, the availability forward fault-tolerant method, and the heuristic optimization algorithm, the maximum temperature was successfully reduced to 2.0750 °C. Moreover, significant enhancements in the average availability of IoT devices were achieved, with improvements of 27.03%, 15.76%, and 10.85% respectively compared to the aforementioned methods. The instantaneous failure rates were 100%, 87.89%, and 84.4% respectively for the three algorithms. This optimization algorithm proves highly efficient in eliminating fault signals and optimizing the prediction of time-limited satisfaction. Furthermore, it exhibits strategic foresight in the decision-making process.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"15 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139084180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN 基于 BN 和 WSN 的无线传感器网络节点故障诊断算法
IF 3.6
EURASIP Journal on Information Security Pub Date : 2023-12-13 DOI: 10.1186/s13635-023-00149-w
Ming Li
{"title":"Node fault diagnosis algorithm for wireless sensor networks based on BN and WSN","authors":"Ming Li","doi":"10.1186/s13635-023-00149-w","DOIUrl":"https://doi.org/10.1186/s13635-023-00149-w","url":null,"abstract":"Wireless sensor networks, as an emerging information exchange technology, have been widely applied in many fields. However, nodes tend to become damaged in harsh and complex environmental conditions. In order to effectively diagnose node faults, a Bayesian model-based node fault diagnosis model was proposed. Firstly, a comprehensive analysis was conducted into the operative principles of wireless sensor systems, whereby fault-related features were then extrapolated. A Bayesian diagnostic model was constructed using the maximum likelihood method with sufficient sample features, and a joint tree model was introduced for node diagnosis. Due to the insufficient accuracy of Bayesian models in processing small sample data, a constrained maximum entropy method was proposed as the prediction module of the model. The use of small sample data to obtain the initial model parameters leads to improved performance and accuracy of the model. During parameter learning tests, the limited maximum entropy model outperformed the other two learning models on a smaller dataset of 35 with a distance value of 2.65. In node fault diagnosis, the diagnostic time of the three models was compared, and the average diagnostic time of the proposed diagnostic model was 41.2 seconds. In the node diagnosis accuracy test, the proposed model has the highest node fault diagnosis accuracy, with an average diagnosis accuracy of 0.946, which is superior to the other two models. In summary, the node fault diagnosis model based on Bayesian model proposed in this study has important research significance and practical application value in wireless sensor networks. By improving the reliability and maintenance efficiency of the network, this model provides strong support for the development and application of wireless sensor networks.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"70 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138630473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信