ICT Express最新文献

筛选
英文 中文
Optimized Falcon Verify on Cortex-M4 for Post-Quantum secure UAV communications 在Cortex-M4上优化猎鹰验证后量子安全无人机通信
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-11-22 DOI: 10.1016/j.icte.2024.11.002
JunHyeok Choi , SeungYong Yoon , Seog Chung Seo
{"title":"Optimized Falcon Verify on Cortex-M4 for Post-Quantum secure UAV communications","authors":"JunHyeok Choi ,&nbsp;SeungYong Yoon ,&nbsp;Seog Chung Seo","doi":"10.1016/j.icte.2024.11.002","DOIUrl":"10.1016/j.icte.2024.11.002","url":null,"abstract":"<div><div>Falcon, a NIST-standardized DSA, is ideal for broadcast-based communication like UAV due to its short key and signature. Since each UAV broadcasts the signed message to surrounding parties, UAVs must verify numerous signatures in flight. After migrating from ECDSA to Falcon for quantum security, it is crucial to maintain the same throughput of signature verification. However, existing Falcon implementations do not guarantee that throughput. We optimize Falcon Verify for Cortex-M4, enhancing NTT-based polynomial multiplication with signed representation and Plantard-based modular multiplication. We outperform the latest Falcon implementation in pqm4 by 64%/75% (resp. Falcon-512/Falcon-1024) in verification time, ensuring ECDSA-like throughput.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 2","pages":"Pages 281-286"},"PeriodicalIF":4.1,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS partitioning and UAV selection for age-of-information optimization in RIS-assisted UAV communications RIS辅助无人机通信中信息年龄优化的RIS划分与无人机选择
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-11-20 DOI: 10.1016/j.icte.2024.10.003
Juseoung Lee, Jaewoo So
{"title":"RIS partitioning and UAV selection for age-of-information optimization in RIS-assisted UAV communications","authors":"Juseoung Lee,&nbsp;Jaewoo So","doi":"10.1016/j.icte.2024.10.003","DOIUrl":"10.1016/j.icte.2024.10.003","url":null,"abstract":"<div><div>Reconfigurable intelligent surface (RIS) has been attracted great attention because it can enhance the capacity and coverage of wireless communication systems. However, when applying RIS to an unmanned aerial vehicle (UAV) networks, it is necessary to manage the RIS reflection elements and UAV scheduling in the BS-RIS-UAVs link. This paper proposes a deep reinforcement learning (DRL)-based resource allocation scheme for jointly determining the number of serving UAVs and their partition-based RIS allocation, aiming to minimize the age of information (AoI). Simulation results show that the proposed DRL-based joint UAV selection and partition-based RIS allocation scheme outperforms all the other schemes without joint optimization in terms of the average AoI.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 2","pages":"Pages 317-322"},"PeriodicalIF":4.1,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating machine learning with proof-of-authority-and-association for dynamic signer selection in blockchain networks 在区块链网络中集成机器学习与权威证明和关联,用于动态签名者选择
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-11-04 DOI: 10.1016/j.icte.2024.10.008
Dong-Seong Kim , Rizal Syamsul
{"title":"Integrating machine learning with proof-of-authority-and-association for dynamic signer selection in blockchain networks","authors":"Dong-Seong Kim ,&nbsp;Rizal Syamsul","doi":"10.1016/j.icte.2024.10.008","DOIUrl":"10.1016/j.icte.2024.10.008","url":null,"abstract":"<div><div>Integrating machine learning (ML) into blockchain consensus mechanisms enhances efficiency, scalability, and resilience. This study introduces the PoA<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span> algorithm, an ML-enhanced Proof of Authority mechanism that optimizes signer selection for improved transaction processing. Simulations with models including Random Forest, Logistic Regression, SVM, K-Nearest Neighbors, Decision Tree, and Gradient Boosting showed significant gains. Random Forest reduced latency tenfold, achieving nearly 1000 transactions per second, with 93.33% accuracy, 100% precision, 86.67% recall, and a 92.86% F1-score. These results demonstrate ML’s potential to enhance blockchain performance, making hybrid blockchain-ML solutions a promising research direction.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 2","pages":"Pages 258-263"},"PeriodicalIF":4.1,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive relay selection strategy for user cooperation networks based on social-aware 基于社会感知的用户协作网络自适应中继选择策略
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-28 DOI: 10.1016/j.icte.2024.10.005
Siyang Xu , Runfeng Zhang , Xiaonan Yang , Xin Song
{"title":"An adaptive relay selection strategy for user cooperation networks based on social-aware","authors":"Siyang Xu ,&nbsp;Runfeng Zhang ,&nbsp;Xiaonan Yang ,&nbsp;Xin Song","doi":"10.1016/j.icte.2024.10.005","DOIUrl":"10.1016/j.icte.2024.10.005","url":null,"abstract":"<div><div>As independent individuals with social attributes, the users for collaborative transmission may have private behaviors such as refusing to relay. By leveraging both near user (NU) and alternative dedicated relay node, an adaptive relay selection strategy based on social-aware is proposed for downlink non-orthogonal multiple access (NOMA) networks. In this framework, a social relationship model is established based on the interest similarity and contact duration between NU and far user (FU). On this basis, the closed form and asymptotic expressions for the outage probability are derived. And the <em>K</em>+1 order diversity gain of the proposed strategy is proved. Simulation results show that the proposed strategy can improve the reliability of communication links and transmission performance.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 2","pages":"Pages 299-304"},"PeriodicalIF":4.1,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities 深度神经网络和信任管理方法确保可持续智慧城市中智能交通数据的安全
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.08.006
Sohrab Khan , Sheharyar Khan , Adel Sulaiman , Mana Saleh Al Reshan , Hani Alshahrani , Asadullah Shaikh
{"title":"Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities","authors":"Sohrab Khan ,&nbsp;Sheharyar Khan ,&nbsp;Adel Sulaiman ,&nbsp;Mana Saleh Al Reshan ,&nbsp;Hani Alshahrani ,&nbsp;Asadullah Shaikh","doi":"10.1016/j.icte.2024.08.006","DOIUrl":"10.1016/j.icte.2024.08.006","url":null,"abstract":"<div><div>Smart transportation, powered by IoT, transforms mobility with interconnected sensors and devices collecting real-time data on traffic, vehicle locations, and passenger needs. This fosters a safer and more sustainable transportation ecosystem, optimizing traffic flow and enhancing public transit efficiency. However, security and privacy challenges emerge in smart transportation systems. Our proposed solution involves a deep neural network (DNN) model trained on extensive datasets from sustainable cities, incorporating historical information like traffic patterns and sensor readings. This model identifies potential malicious nodes, achieving a 90% accuracy rate in predicting threats such as Denial of Service 88%, Whitewash attacks 80%, and Brute Force attacks 75%. This high precision ensures the security and privacy of passenger vehicle data and routes.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1059-1065"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates 数字信息素:基于时变多变量构建智能手机用户的数字身份
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.07.008
Anizah Abu Bakar, Azizul Rahman Mohd Shariff, Chan Jia Huei, Suzi Iryanti Fadilah
{"title":"The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates","authors":"Anizah Abu Bakar,&nbsp;Azizul Rahman Mohd Shariff,&nbsp;Chan Jia Huei,&nbsp;Suzi Iryanti Fadilah","doi":"10.1016/j.icte.2024.07.008","DOIUrl":"10.1016/j.icte.2024.07.008","url":null,"abstract":"<div><div>The increasing reliance on smartphones necessitates secure, accurate user identification methods. This study introduces “digital pheromones”, a novel digital identity creation method based on smartphone user behaviors. Represented by a 56-bit binary number, this identity is derived from quantization and concatenation of 14 time-varying smartphone variables. Motivated by the need for enhanced security and privacy, the study employs statistical analysis to measure user behavior dispersion, showing that wider dispersion variables facilitate faster user uniqueness at lower quantization levels. The results demonstrate 100% uniqueness, ensuring no two users share the same 56-bit identity. This research offers a robust framework for future advancements in smartphone user authentication and identification systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 981-988"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Approach with Membership-Density Based Oversampling for handling multi-class imbalance in Internet Traffic Identification with overlapping and noise 基于成员密度超采样的混合方法,用于处理具有重叠和噪声的互联网流量识别中的多类不平衡问题
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.04.007
{"title":"Hybrid Approach with Membership-Density Based Oversampling for handling multi-class imbalance in Internet Traffic Identification with overlapping and noise","authors":"","doi":"10.1016/j.icte.2024.04.007","DOIUrl":"10.1016/j.icte.2024.04.007","url":null,"abstract":"<div><div>Internet Traffic identification is a crucial method for monitoring Internet application activities and is essential for Internet management and security. Internet traffic data typically displays imbalanced distributions. The uneven distribution of instances in each class indicates the class imbalance problem. This problem can cause a decrease in classification performance because the classifier assumes the dataset has a balanced class distribution. Internet Traffic Identification dataset is often accompanied by overlapping and noise. The hybrid approach to handling class imbalances involving data-level and ensemble-based approaches is usually chosen to overcome this problem. Data-level with oversampling using SMOTE is the choice because of its ability to synthesize new samples for minority classes. However, SMOTE-generated samples tend to be noisy and overlap with the majority of samples. This research proposes the application of a Hybrid Approach with Membership-density-based Oversampling to tackle this challenge. This research emphasizes the importance of applying membership degrees in determining samples that will group samples into safe, overlapping, and noisy areas. Then, top samples will be selected based on density ratio, stability, and score for safe and overlapping safe areas. The study findings that the proposed method effectively addresses multi-class imbalances in six Internet Traffic Identification datasets, yielding slightly improved average accuracy, <span><math><mrow><msub><mrow><mi>F</mi></mrow><mrow><mi>b</mi></mrow></msub><mi>M</mi><mi>e</mi><mi>a</mi><mi>s</mi><mi>u</mi><mi>r</mi><mo>,</mo></mrow></math></span> and class balance accuracy results compared to other testing methods, though the difference is not statistically significant. The noise and overlapping scenes experiments demonstrate that the average accuracy obtained is superior, showing a considerable difference compared to all test methods.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1094-1102"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140759700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond 未来无线网络中的边缘计算:对 6G 及其后的全面评估和展望
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.08.007
Mustafa Ergen , Bilal Saoud , Ibraheem Shayea , Ayman A. El-Saleh , Onur Ergen , Feride Inan , Mehmet Fatih Tuysuz
{"title":"Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond","authors":"Mustafa Ergen ,&nbsp;Bilal Saoud ,&nbsp;Ibraheem Shayea ,&nbsp;Ayman A. El-Saleh ,&nbsp;Onur Ergen ,&nbsp;Feride Inan ,&nbsp;Mehmet Fatih Tuysuz","doi":"10.1016/j.icte.2024.08.007","DOIUrl":"10.1016/j.icte.2024.08.007","url":null,"abstract":"<div><div>Future internet aims to function as a neutral in-network storage and computation platform, essential for enabling 6G and beyond wireless use cases. Information-Centric Networking and Edge Computing are key paradigms driving this vision by offering diversified services with fast response times across heterogeneous networks. This approach requires effective coordination to dynamically utilize resources like links, storage, and computation in near real-time within a non-homogenous and distributed computing environment. Additionally, networks must be aware of resource availability and reputational information to manage unknown and partially observed dynamic systems, ensuring the desired Quality of Experience (QoE). This paper provides a comprehensive evaluation of edge computing technologies, starting with an introduction to its architectural frameworks. We examine contemporary research on essential aspects such as resource allocation, computation delegation, data administration, and network management, highlighting existing research gaps. Furthermore, we explore the synergy between edge computing and 5G, and discuss advancements in 6G that enhance solutions through edge computing. Our study emphasizes the importance of integrating edge computing in future considerations, particularly regarding sustainable energy and standards.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1151-1173"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid approach of ConvLSTMBNN-DT and GPT-4 for real-time anomaly detection decision support in edge–cloud environments 用于边缘云环境中实时异常检测决策支持的 ConvLSTMBNN-DT 和 GPT-4 混合方法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.07.007
Radityo Fajar Pamungkas, Ida Bagus Krishna Yoga Utama, Khairi Hindriyandhito, Yeong Min Jang
{"title":"A hybrid approach of ConvLSTMBNN-DT and GPT-4 for real-time anomaly detection decision support in edge–cloud environments","authors":"Radityo Fajar Pamungkas,&nbsp;Ida Bagus Krishna Yoga Utama,&nbsp;Khairi Hindriyandhito,&nbsp;Yeong Min Jang","doi":"10.1016/j.icte.2024.07.007","DOIUrl":"10.1016/j.icte.2024.07.007","url":null,"abstract":"<div><div>Anomaly detection is a critical requirement across diverse domains to promptly identify abnormal behavior. Conventional approaches often face limitations with uninterpretable anomaly detection results, impeding efficient decision-making processes. This paper introduces a novel hybrid approach, the convolutional LSTM Bayesian neural network with nonparametric dynamic thresholding (ConvLSTMBNN-DT) for prediction-based anomaly detection. In addition, the model integrates fine-tuned generative pre-training version 4 (GPT-4) to provide human-interpretable explanations in edge–cloud environments. The proposed method demonstrates exceptional performance, achieving an average <span><math><mrow><mi>F</mi><mn>1</mn><mo>−</mo><mi>s</mi><mi>c</mi><mi>o</mi><mi>r</mi><mi>e</mi></mrow></math></span> of 0.91 and an area under the receiver operating characteristic curve (<span><math><mrow><mi>A</mi><mi>U</mi><mi>C</mi></mrow></math></span>) of 0.86. Additionally, it effectively offers comprehensible decision-support explanations.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1026-1033"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbol-level precoding scheme robust to channel estimation errors in wireless fading channels 对无线衰减信道中的信道估计误差具有鲁棒性的符号级预编码方案
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-10-01 DOI: 10.1016/j.icte.2024.03.006
{"title":"Symbol-level precoding scheme robust to channel estimation errors in wireless fading channels","authors":"","doi":"10.1016/j.icte.2024.03.006","DOIUrl":"10.1016/j.icte.2024.03.006","url":null,"abstract":"<div><div>Most studies on symbol-level (SL) precoding have assumed that channel estimation is perfect. However, because interference signals or additive white Gaussian noise exist in the received signal for channel estimation, channel estimation errors always exist. In this paper, we propose an SL precoding scheme that is robust to channel estimation errors. First, using the characteristics of the channel estimation errors, we derive an equation for the worst-case mean squared error (MSE) which is the maximum of the MSE. Then by designing the SL precoding to minimize the worst-case MSE, it has robust characteristics against channel estimation errors.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1066-1072"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信