ICT Express最新文献

筛选
英文 中文
Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities 深度神经网络和信任管理方法确保可持续智慧城市中智能交通数据的安全
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.08.006
Sohrab Khan , Sheharyar Khan , Adel Sulaiman , Mana Saleh Al Reshan , Hani Alshahrani , Asadullah Shaikh
{"title":"Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities","authors":"Sohrab Khan ,&nbsp;Sheharyar Khan ,&nbsp;Adel Sulaiman ,&nbsp;Mana Saleh Al Reshan ,&nbsp;Hani Alshahrani ,&nbsp;Asadullah Shaikh","doi":"10.1016/j.icte.2024.08.006","DOIUrl":"10.1016/j.icte.2024.08.006","url":null,"abstract":"<div><div>Smart transportation, powered by IoT, transforms mobility with interconnected sensors and devices collecting real-time data on traffic, vehicle locations, and passenger needs. This fosters a safer and more sustainable transportation ecosystem, optimizing traffic flow and enhancing public transit efficiency. However, security and privacy challenges emerge in smart transportation systems. Our proposed solution involves a deep neural network (DNN) model trained on extensive datasets from sustainable cities, incorporating historical information like traffic patterns and sensor readings. This model identifies potential malicious nodes, achieving a 90% accuracy rate in predicting threats such as Denial of Service 88%, Whitewash attacks 80%, and Brute Force attacks 75%. This high precision ensures the security and privacy of passenger vehicle data and routes.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1059-1065"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates 数字信息素:基于时变多变量构建智能手机用户的数字身份
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.07.008
Anizah Abu Bakar, Azizul Rahman Mohd Shariff, Chan Jia Huei, Suzi Iryanti Fadilah
{"title":"The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates","authors":"Anizah Abu Bakar,&nbsp;Azizul Rahman Mohd Shariff,&nbsp;Chan Jia Huei,&nbsp;Suzi Iryanti Fadilah","doi":"10.1016/j.icte.2024.07.008","DOIUrl":"10.1016/j.icte.2024.07.008","url":null,"abstract":"<div><div>The increasing reliance on smartphones necessitates secure, accurate user identification methods. This study introduces “digital pheromones”, a novel digital identity creation method based on smartphone user behaviors. Represented by a 56-bit binary number, this identity is derived from quantization and concatenation of 14 time-varying smartphone variables. Motivated by the need for enhanced security and privacy, the study employs statistical analysis to measure user behavior dispersion, showing that wider dispersion variables facilitate faster user uniqueness at lower quantization levels. The results demonstrate 100% uniqueness, ensuring no two users share the same 56-bit identity. This research offers a robust framework for future advancements in smartphone user authentication and identification systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 981-988"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Approach with Membership-Density Based Oversampling for handling multi-class imbalance in Internet Traffic Identification with overlapping and noise 基于成员密度超采样的混合方法,用于处理具有重叠和噪声的互联网流量识别中的多类不平衡问题
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.04.007
{"title":"Hybrid Approach with Membership-Density Based Oversampling for handling multi-class imbalance in Internet Traffic Identification with overlapping and noise","authors":"","doi":"10.1016/j.icte.2024.04.007","DOIUrl":"10.1016/j.icte.2024.04.007","url":null,"abstract":"<div><div>Internet Traffic identification is a crucial method for monitoring Internet application activities and is essential for Internet management and security. Internet traffic data typically displays imbalanced distributions. The uneven distribution of instances in each class indicates the class imbalance problem. This problem can cause a decrease in classification performance because the classifier assumes the dataset has a balanced class distribution. Internet Traffic Identification dataset is often accompanied by overlapping and noise. The hybrid approach to handling class imbalances involving data-level and ensemble-based approaches is usually chosen to overcome this problem. Data-level with oversampling using SMOTE is the choice because of its ability to synthesize new samples for minority classes. However, SMOTE-generated samples tend to be noisy and overlap with the majority of samples. This research proposes the application of a Hybrid Approach with Membership-density-based Oversampling to tackle this challenge. This research emphasizes the importance of applying membership degrees in determining samples that will group samples into safe, overlapping, and noisy areas. Then, top samples will be selected based on density ratio, stability, and score for safe and overlapping safe areas. The study findings that the proposed method effectively addresses multi-class imbalances in six Internet Traffic Identification datasets, yielding slightly improved average accuracy, <span><math><mrow><msub><mrow><mi>F</mi></mrow><mrow><mi>b</mi></mrow></msub><mi>M</mi><mi>e</mi><mi>a</mi><mi>s</mi><mi>u</mi><mi>r</mi><mo>,</mo></mrow></math></span> and class balance accuracy results compared to other testing methods, though the difference is not statistically significant. The noise and overlapping scenes experiments demonstrate that the average accuracy obtained is superior, showing a considerable difference compared to all test methods.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1094-1102"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140759700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbol-level precoding scheme robust to channel estimation errors in wireless fading channels 对无线衰减信道中的信道估计误差具有鲁棒性的符号级预编码方案
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.03.006
{"title":"Symbol-level precoding scheme robust to channel estimation errors in wireless fading channels","authors":"","doi":"10.1016/j.icte.2024.03.006","DOIUrl":"10.1016/j.icte.2024.03.006","url":null,"abstract":"<div><div>Most studies on symbol-level (SL) precoding have assumed that channel estimation is perfect. However, because interference signals or additive white Gaussian noise exist in the received signal for channel estimation, channel estimation errors always exist. In this paper, we propose an SL precoding scheme that is robust to channel estimation errors. First, using the characteristics of the channel estimation errors, we derive an equation for the worst-case mean squared error (MSE) which is the maximum of the MSE. Then by designing the SL precoding to minimize the worst-case MSE, it has robust characteristics against channel estimation errors.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1066-1072"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated beamforming and trajectory optimization algorithm for RIS-assisted UAV system RIS 辅助无人机系统的波束成形和轨迹优化综合算法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.04.008
{"title":"Integrated beamforming and trajectory optimization algorithm for RIS-assisted UAV system","authors":"","doi":"10.1016/j.icte.2024.04.008","DOIUrl":"10.1016/j.icte.2024.04.008","url":null,"abstract":"<div><div>Unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) have garnered considerable research interest in the fields of 5G and 6G wireless communication due to their remarkable flexibility and cost-effectiveness. However, the inherent openness of wireless communication environments renders these technologies vulnerable to eavesdropping. This paper presents a penalty-based successive convex approximation algorithm and a minorize–maximization algorithm to optimize the transmission beamforming vector, RIS beamforming vector, and UAV–RIS trajectory. The objective of this study was to enhance the physical layer security performance of wireless communication systems using UAVs and RISs. Our simulation results demonstrate that the proposed technique achieves a higher security transmission rate compared to existing techniques.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1080-1086"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140762996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond 未来无线网络中的边缘计算:对 6G 及其后的全面评估和展望
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.08.007
Mustafa Ergen , Bilal Saoud , Ibraheem Shayea , Ayman A. El-Saleh , Onur Ergen , Feride Inan , Mehmet Fatih Tuysuz
{"title":"Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond","authors":"Mustafa Ergen ,&nbsp;Bilal Saoud ,&nbsp;Ibraheem Shayea ,&nbsp;Ayman A. El-Saleh ,&nbsp;Onur Ergen ,&nbsp;Feride Inan ,&nbsp;Mehmet Fatih Tuysuz","doi":"10.1016/j.icte.2024.08.007","DOIUrl":"10.1016/j.icte.2024.08.007","url":null,"abstract":"<div><div>Future internet aims to function as a neutral in-network storage and computation platform, essential for enabling 6G and beyond wireless use cases. Information-Centric Networking and Edge Computing are key paradigms driving this vision by offering diversified services with fast response times across heterogeneous networks. This approach requires effective coordination to dynamically utilize resources like links, storage, and computation in near real-time within a non-homogenous and distributed computing environment. Additionally, networks must be aware of resource availability and reputational information to manage unknown and partially observed dynamic systems, ensuring the desired Quality of Experience (QoE). This paper provides a comprehensive evaluation of edge computing technologies, starting with an introduction to its architectural frameworks. We examine contemporary research on essential aspects such as resource allocation, computation delegation, data administration, and network management, highlighting existing research gaps. Furthermore, we explore the synergy between edge computing and 5G, and discuss advancements in 6G that enhance solutions through edge computing. Our study emphasizes the importance of integrating edge computing in future considerations, particularly regarding sustainable energy and standards.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1151-1173"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid approach of ConvLSTMBNN-DT and GPT-4 for real-time anomaly detection decision support in edge–cloud environments 用于边缘云环境中实时异常检测决策支持的 ConvLSTMBNN-DT 和 GPT-4 混合方法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.07.007
Radityo Fajar Pamungkas, Ida Bagus Krishna Yoga Utama, Khairi Hindriyandhito, Yeong Min Jang
{"title":"A hybrid approach of ConvLSTMBNN-DT and GPT-4 for real-time anomaly detection decision support in edge–cloud environments","authors":"Radityo Fajar Pamungkas,&nbsp;Ida Bagus Krishna Yoga Utama,&nbsp;Khairi Hindriyandhito,&nbsp;Yeong Min Jang","doi":"10.1016/j.icte.2024.07.007","DOIUrl":"10.1016/j.icte.2024.07.007","url":null,"abstract":"<div><div>Anomaly detection is a critical requirement across diverse domains to promptly identify abnormal behavior. Conventional approaches often face limitations with uninterpretable anomaly detection results, impeding efficient decision-making processes. This paper introduces a novel hybrid approach, the convolutional LSTM Bayesian neural network with nonparametric dynamic thresholding (ConvLSTMBNN-DT) for prediction-based anomaly detection. In addition, the model integrates fine-tuned generative pre-training version 4 (GPT-4) to provide human-interpretable explanations in edge–cloud environments. The proposed method demonstrates exceptional performance, achieving an average <span><math><mrow><mi>F</mi><mn>1</mn><mo>−</mo><mi>s</mi><mi>c</mi><mi>o</mi><mi>r</mi><mi>e</mi></mrow></math></span> of 0.91 and an area under the receiver operating characteristic curve (<span><math><mrow><mi>A</mi><mi>U</mi><mi>C</mi></mrow></math></span>) of 0.86. Additionally, it effectively offers comprehensible decision-support explanations.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1026-1033"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-orthogonal resource scheduling with enhanced preamble detection method for cellular random access networks 蜂窝随机接入网络的非正交资源调度与增强型前导码检测方法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.08.005
Han Seung Jang , Munseop Yun , Taehoon Kim , Inkyu Bang
{"title":"Non-orthogonal resource scheduling with enhanced preamble detection method for cellular random access networks","authors":"Han Seung Jang ,&nbsp;Munseop Yun ,&nbsp;Taehoon Kim ,&nbsp;Inkyu Bang","doi":"10.1016/j.icte.2024.08.005","DOIUrl":"10.1016/j.icte.2024.08.005","url":null,"abstract":"<div><div>In this article, we propose a non-orthogonal resource scheduling (NORS) scheme with an enhanced preamble detection (PD) method for cellular random access (RA) systems. The enhanced PD method is designed based on a deep learning technique that can classify three PD statuses: idle, collision-free, and collision. Because of this collision resolution capability, the base station (BS) can exploit radio resources non-orthogonally in contention-based RA protocols. In addition, we mathematically analyze the performance of our proposed NORS scheme in terms of RA success probability and resource utilization efficiency and conduct a comparison with the baseline orthogonal resource scheduling (ORS) scheme. Through simulations, we verify the validity of our mathematical analysis. As a result, our results will be a useful guideline for resource scheduling and provide support for massive connectivity.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1117-1123"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of multi-hop low earth orbit satellite network over mixed RF/FSO links 通过射频/FSO 混合链路的多跳低地球轨道卫星网络性能分析
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.03.004
{"title":"Performance analysis of multi-hop low earth orbit satellite network over mixed RF/FSO links","authors":"","doi":"10.1016/j.icte.2024.03.004","DOIUrl":"10.1016/j.icte.2024.03.004","url":null,"abstract":"<div><div>Low earth orbit satellite (LEOS) communication has emerged as a promising technology to achieve global coverage, while further reducing the end-to-end latency by establishing communication link between LEOSs. In this paper, we analyze the performance of multi-hop LEOS network in terms of bit error rate (BER) and outage probability over mixed radio frequency (RF)/free space optical (FSO) links where RF link is used for the link between ground terminal and LEOS and FSO link is used for establishing inter-satellite links (ISLs). The derived closed-form results are confirmed via Monte Carlo simulations and we show the effect of the number of satellite hops on outage probability and average BER performance by comparing scenarios both with and without ISLs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1051-1058"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-aided double beamforming optimization algorithm for improving secrecy rate in space–ground integrated networks 用于提高空地一体化网络保密率的 RIS 辅助双波束成形优化算法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.04.003
{"title":"RIS-aided double beamforming optimization algorithm for improving secrecy rate in space–ground integrated networks","authors":"","doi":"10.1016/j.icte.2024.04.003","DOIUrl":"10.1016/j.icte.2024.04.003","url":null,"abstract":"<div><div>The high-frequency band, crucial for supporting the 5G/6G system, faces challenges of signal obstruction by obstacles. This is attributed to significant path loss resulting from radio straightness and short radio distance. To address these challenges, there is a growing interest in leveraging non-terrestrial networks (NTNs) and reconfigurable intelligent surfaces (RISs), utilizing high-altitude satellites as base stations or terminals. Within a three-dimensional NTN system, the vulnerability of wireless signals to eavesdropping due to the open nature of the environment is a notable drawback. To mitigate this vulnerability, this paper introduces an algorithm designed to maximize the secrecy rate. The proposed algorithm optimizes security performance by fine-tuning the base station and RIS beamforming vectors. This optimization is achieved through successive convex approximation and minorization–maximization algorithms. Simulation results affirm the superiority of the proposed algorithm in terms of secrecy rate over existing techniques.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1073-1079"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140763047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信