Journal of King Saud University-Computer and Information Sciences最新文献

筛选
英文 中文
Using Twitter as a digital insight into public stance on societal behavioral dynamics 利用推特以数字方式洞察公众对社会行为动态的态度
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102078
Aqil M. Azmi, Abdulrahman I. Al-Ghadir
{"title":"Using Twitter as a digital insight into public stance on societal behavioral dynamics","authors":"Aqil M. Azmi,&nbsp;Abdulrahman I. Al-Ghadir","doi":"10.1016/j.jksuci.2024.102078","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102078","url":null,"abstract":"<div><p>This study explores X’s (formerly Twitter’s) capacity to serve as a real-time barometer of public sentiment, contextualized within the transformative reforms of Saudi Arabia during 2016–2017. The objective was to decipher the populace’s response to these significant national changes by analyzing approximately 200 million tweets in native Arabic dialects, thereby aiming for an authentic portrayal of local sentiment. Our methodology entailed a dual-phase analysis: initial tweet examination to discern prevalent social behaviors, followed by stance detection to classify tweets according to their support, neutrality, or opposition to the divisive issues at hand. For sentiment extraction, we employed a sophisticated feature vector, integrating the <span><math><mi>k</mi></math></span> most frequent words and stems. A comprehensive evaluation of various classifiers was conducted, including Support Vector Machine and several variants of <span><math><mi>K</mi></math></span>-nearest neighbors (<em>K</em>-NN), with a particular emphasis on their applicability to our dataset. Notably, the 9-NN classifier, and more specifically, the weighted <em>K</em>-NN approach, demonstrated remarkable performance, achieving an <span><math><mi>F</mi></math></span>-score of 72.45%. These insights not only shed light on the public’s reception to the Saudi reforms but also position Twitter as a viable, real-time alternative to traditional survey methods for capturing the nuances of public opinion, thereby offering valuable perspectives for policy formulation.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001678/pdfft?md5=3d4625d5e627d37058cbc75afe0e84d8&pid=1-s2.0-S1319157824001678-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141289161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms 使用竞争性群体优化算法特征选择的标签学习方法,以改进多标签分类算法
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102083
Lianhe Cui
{"title":"A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms","authors":"Lianhe Cui","doi":"10.1016/j.jksuci.2024.102083","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102083","url":null,"abstract":"<div><p>One of the crucial pre-processing stages in data mining and machine learning is feature selection, which is used to choose a subset of representative characteristics and decrease dimensions. By eliminating unnecessary and redundant features, feature selection can improve machine learning tasks’ accuracy. This work presents a novel multi-label classification (MLC) model utilizing a combination of stack regression (RR) and original label space transformation (IPLST) called RR-IPLST (original label space transformation-ridge regression). A novel embedded technique is implemented, utilizing competitive crowding optimizer (CSO) for multi-label feature selection. Particles are first created using this procedure, after which they are split into two equal groups and compete in pairs. The winners advance to the next iteration, while the losers pick up tips from the victors. At the conclusion of each iteration, the objective function for every particle is determined. A local search technique inspired by the gradient descent algorithm is used to find the local structure of the data, and half of the initial population is produced by the similarity between features and labels in order to boost the convergence rate. Ultimately, feature selection is carried out depending on the best particle. Six popular and sophisticated multi-label feature selection techniques are evaluated to see how well the suggested approach performs. According to the simulation results, the application of the suggested solution performs better than comparable techniques in terms of stability, accuracy, precision, convergence, error measurement, and other criteria that have been examined on various data sets. In 93.35% of cases, the test results demonstrate superiority over traditional algorithms.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001721/pdfft?md5=bc950af29ef97e35d24c4f924eb4ca7d&pid=1-s2.0-S1319157824001721-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations 研究由 SDN 技术驱动的工业物联网智能工厂:对分类、架构、问题和未来研究方向的全面调查
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102069
Nteziriza Nkerabahizi Josbert, Min Wei, Ping Wang, Ahsan Rafiq
{"title":"A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations","authors":"Nteziriza Nkerabahizi Josbert,&nbsp;Min Wei,&nbsp;Ping Wang,&nbsp;Ahsan Rafiq","doi":"10.1016/j.jksuci.2024.102069","DOIUrl":"10.1016/j.jksuci.2024.102069","url":null,"abstract":"<div><p>The Internet of Things (IoT) provides a major contribution to the innovation of smart manufacturing and industrial automation. Due to IoT, network devices and intelligent machines exchange information through different types of Internet connection and processes are predominantly automated. This reduces significantly the need for more human intervention and supports high performance. Nevertheless, the utilization of IoT in industrial automation called Industrial IoT (IIoT) has several issues, including the management of applications and IIoT devices. Moreover, heterogeneous networks and tremendous devices deployed in the IIoT environment require flexible configuration and reconfiguration according to the change for ensuring dynamic performance. We argue that Software-Defined Networking (SDN) is one of the technologies that can be used to solve some of the previously mentioned issues. In this paper, we propose a survey for the implementation of SDN solutions in IIoT and discuss the pros and cons brought about by this synergy named “SDN-IIoT”. We explore the current articles on SDN-IIoT by considering different crucial domains such as flow installation techniques, fault tolerance, traffic routing optimization, resource management, energy efficiency, real-time, and network security. Furthermore, we analyze Artificial Intelligence (AI)/Machine Learning (ML) tasks to improve the performance of SDN-IIoT and the deployment of different technologies like Network Function Virtualization (NFV) and Time-Sensitive Networking (TSN) in SDN-IIoT. After observing the limitations of existing SDN-IIoT architectures, we propose an improved candidate architecture for SDN-IIoT based on a hierarchical distributed control plane. The new SDN-IIoT architecture contains AI, Industrial Backhaul Network (IBN), Dynamic Hash Table (DHT), AdaptFlow protocol, and edge/cloud storages. This paper selects the five most used SDN controllers by the literature review and identifies the features of each SDN controller. In the end, we provide open challenges and future research orientations in SDN-IIoT. We hope that this paper will be helpful for engineers, organizations, and researchers on the innovation of IIoT and SDN technologies.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001587/pdfft?md5=6ce1982470bdb9855cf538db6ce55a9d&pid=1-s2.0-S1319157824001587-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects 无线网络的数字化转型:全面分析移动数据卸载技术、挑战和未来前景
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102071
Noryusra Rosele , Khuzairi Mohd Zaini , Nurakmal Ahmad Mustaffa , Ahmad Abrar , Suzi Iryanti Fadilah , Mohammed Madi
{"title":"Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects","authors":"Noryusra Rosele ,&nbsp;Khuzairi Mohd Zaini ,&nbsp;Nurakmal Ahmad Mustaffa ,&nbsp;Ahmad Abrar ,&nbsp;Suzi Iryanti Fadilah ,&nbsp;Mohammed Madi","doi":"10.1016/j.jksuci.2024.102071","DOIUrl":"10.1016/j.jksuci.2024.102071","url":null,"abstract":"<div><p>Mobile data offloading is a highly promising approach in mobile networks that tackles network congestion at Base Stations (BSs) and greatly improves both the Quality of Service (QoS) and Quality of Experience (QoE) for users. It presents significant business opportunities for operators, particularly in light of the exponential growth in mobile data traffic and the ongoing digital transformation. To effectively uphold the desired levels of QoS and QoE in the elevation of escalating digitalization and the unprecedented surge in data traffic, this paper presents offloading through a diverse range of technologies such as data offloading through Small Cell Networks (SCNs), Wi-Fi offloading, Device-to-Device (D2D) offloading, and data offloading through Vehicular Ad-Hoc Networks (VANETs). The SCNs and Wi-Fi offloading involve migrating data traffic to the alternative infrastructure i.e. the small BS and the Wi-Fi Access Points (AP), respectively while D2D focuses on transferring data through the device without transversing the BSs. VANETs is the process of offloading data in vehicular scenarios that consist of Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X). Additionally, mobile data offloading from cellular BS is categorized into four main factors: energy consumption or energy awareness, economic considerations, user satisfaction, and network congestion. These factors play a crucial role in the ongoing adoption and implementation of mobile data offloading strategies. Different technologies utilize diverse techniques to tackle the challenge of offloading, aligning with their specific research objectives. This paper delves into the challenges and outlines future research directions in the field of mobile traffic offloading.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001605/pdfft?md5=aaf7f2b0bd072c92e8c8927e1f21fdfa&pid=1-s2.0-S1319157824001605-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141143201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the deep learning software tools for large-scale enterprises using a novel TODIFFA-MCDM framework 使用新型 TODIFFA-MCDM 框架评估大型企业的深度学习软件工具
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102079
Zoran Gligorić , Ömer Faruk Görçün , Miloš Gligorić , Dragan Pamucar , Vladimir Simic , Hande Küçükönder
{"title":"Evaluating the deep learning software tools for large-scale enterprises using a novel TODIFFA-MCDM framework","authors":"Zoran Gligorić ,&nbsp;Ömer Faruk Görçün ,&nbsp;Miloš Gligorić ,&nbsp;Dragan Pamucar ,&nbsp;Vladimir Simic ,&nbsp;Hande Küçükönder","doi":"10.1016/j.jksuci.2024.102079","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102079","url":null,"abstract":"<div><p>Deep learning (DL) is one of the most promising technological developments emerging in the fourth industrial revolution era for businesses to improve processes, increase efficiency, and reduce errors. Accordingly, hierarchical learning software selection is one of the most critical decision-making problems in integrating neural network applications into business models. However, selecting appropriate reinforcement learning software for integrating deep learning applications into enterprises’ business models takes much work for decision-makers. There are several reasons for this: first, practitioners’ limited knowledge and experience of DL makes it difficult for decision-makers to adapt this technology into their enterprises’ business model and significantly increases complex uncertainties. Secondly, according to the authors’ knowledge, no study in the literature addresses deep structured learning solutions with the help of MCDM approaches. Consequently, making inferences concerning criteria that should be considered in an evaluation process is impossible by considering the studies in the relevant literature. Considering these gaps, this study presents a novel decision-making approach developed by the authors. It involves the combination of two new decision-making approaches, MAXC (MAXimum of Criterion) and TODIFFA (the total differential of alternative), which were developed to solve current decision-making problems. When the most important advantages of this model are considered, it associates objective and subjective approaches and eliminates some critical limitations of these methodologies. Besides, it has an easily followable algorithm without the need for advanced mathematical knowledge for practitioners and provides highly stable and reliable results in solving complex decision-making problems. Another novelty of the study is that the criteria are determined with a long-term negotiation process that is part of comprehensive fieldwork with specialists. When the conclusions obtained using this model are briefly reviewed, the C2 “Data Availability and Quality” criterion is the most influential in selecting deep learning software. The C7 “Time Constraints” criterion follows the most influential factor. Remarkably, prior research has overlooked the correlation between the performance of Deep Learning (DL) platforms and the quality and accessibility of data. The findings of this study underscore the necessity for DL platform developers to devise solutions to enable DL platforms to operate effectively, notwithstanding the availability of clean, high-quality, and adequate data. Finally, the robustness check carried out to test the validity of the proposed model confirms the accuracy and robustness of the results obtained by implementing the suggested model.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400168X/pdfft?md5=35294d2abb229ca991ec30d8b2daf9ef&pid=1-s2.0-S131915782400168X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical classified storage and incentive consensus scheme for building IoT under blockchain 区块链下构建物联网的分级分类存储和激励共识方案
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102075
Xiaohua Wu , Jinqian Jiang , Xiaoyu Li , Jun Cheng , Tao Meng
{"title":"Hierarchical classified storage and incentive consensus scheme for building IoT under blockchain","authors":"Xiaohua Wu ,&nbsp;Jinqian Jiang ,&nbsp;Xiaoyu Li ,&nbsp;Jun Cheng ,&nbsp;Tao Meng","doi":"10.1016/j.jksuci.2024.102075","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102075","url":null,"abstract":"<div><p>With the advancements of IoT and blockchain, a novel era has emerged in the domain of smart building systems. At the same time, it also brings some problems and challenges. Most traditional solutions typically utilize the fully-replicated storage strategy that results in high storage costs, while recent solutions like coded blockchain may compromise query efficiency. Moreover, traditional reputation-based consensus schemes do not consider dynamic situations, limiting scalability. To handle these problems, we propose a novel hierarchical message aggregation scheme and a classified storage method under Reed–Solomon (RS) coding to minimize storage overhead while ensuring data recoverability and query performance. Additionally, we introduce a dynamic incentive reputation consensus mechanism to tackle scalability challenges such as preventing node monopolies, promoting new node integration, and enhancing fault tolerance. Through theoretical analysis and experimental simulation, the proposed scheme demonstrates a high degree of decentralization and scalability. Our scheme achieves a 20% reduction in the Gini coefficient compared to other approaches. Furthermore, our scheme can save <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mn>9</mn></mrow></mfrac></math></span> of storage overhead compared to traditional solutions while maintaining high query performance.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001642/pdfft?md5=add4298d76d4f1f8ccfe23321cd101f3&pid=1-s2.0-S1319157824001642-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks 基于无服务器无线传感器网络的增强型中心点节能聚类路由协议
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102067
Seemab Karim , Kashif Naseer Qureshi , Ashraf Osman Ibrahim , Anas W. Abulfaraj , Kayhan Zrar Ghafoor
{"title":"Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks","authors":"Seemab Karim ,&nbsp;Kashif Naseer Qureshi ,&nbsp;Ashraf Osman Ibrahim ,&nbsp;Anas W. Abulfaraj ,&nbsp;Kayhan Zrar Ghafoor","doi":"10.1016/j.jksuci.2024.102067","DOIUrl":"10.1016/j.jksuci.2024.102067","url":null,"abstract":"<div><p>Serverless computing is a new concept as cloud computing, which dynamically manages the networks and is applied in Serverless Wireless Sensor Networks (SWSN) to help the networks. These networks are becoming famous for monitoring various physical and environmental factors. Serverless computing also facilitates the networks by offering an extensive range of applications. Different applications have been designed for monitoring purposes where the sensor nodes sense the data and transmit it to the base station through single or multi-hop routing. However, existing routing protocols cannot manage the sensor nodes’ energy issues because of the complex routing processes and depleted their power before their time. Because of these limitations, the nodes close to BS continuously rely on the network for data forwarding. As a result, these nodes cause energy consumption and lead to a useless state. This paper proposes a serverless architecture and designs an Enhanced Centroid-based Energy Efficient Clustering (ECEEC) protocol for SWSN networks. The proposed serverless architecture provides automated scalability, cost-effective services, and stateless execution. In addition, the proposed protocol offers the cluster head selection and its rotation to maximize the energy efficiency in the network. Furthermore, gateway nodes are chosen in every cluster to overcome the load on the cluster head. Simulation results indicated the excellent performance of the proposed protocol as compared to the existing routing protocols concerning network lifetime and energy consumption. The proposed protocol shows better reliability with nodes failing at 650 rounds compared to 600 rounds, especially with 5 % and 10 % Cluster Heads. The proposed protocol exhibits superior energy efficiency consumption of SNs under varying CH percentages, indicating the protocol’s consistent performance across different scenarios.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001563/pdfft?md5=5a3bdb58d0a76ae151a3921341d6cfe8&pid=1-s2.0-S1319157824001563-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141038445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A coding computation scheme for secure aggregation 安全聚合的编码计算方案
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102073
Ze Yang, Youliang Tian
{"title":"A coding computation scheme for secure aggregation","authors":"Ze Yang,&nbsp;Youliang Tian","doi":"10.1016/j.jksuci.2024.102073","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102073","url":null,"abstract":"<div><p>Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001629/pdfft?md5=fc659df9e1f4526f6a296b14e211b013&pid=1-s2.0-S1319157824001629-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141241978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New simultaneous Diophantine attacks on generalized RSA key equations 对广义 RSA 密钥方程的新同步 Diophantine 攻击
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-05-23 DOI: 10.1016/j.jksuci.2024.102074
Wan Nur Aqlili Ruzai , Muhammad Rezal Kamel Ariffin , Muhammad Asyraf Asbullah , Amir Hamzah Abd Ghafar
{"title":"New simultaneous Diophantine attacks on generalized RSA key equations","authors":"Wan Nur Aqlili Ruzai ,&nbsp;Muhammad Rezal Kamel Ariffin ,&nbsp;Muhammad Asyraf Asbullah ,&nbsp;Amir Hamzah Abd Ghafar","doi":"10.1016/j.jksuci.2024.102074","DOIUrl":"10.1016/j.jksuci.2024.102074","url":null,"abstract":"<div><p>RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption. The security of RSA relies on the challenge of integer factorization, a problem considered either computationally infeasible or highly intricate, especially when dealing with sufficiently large security parameters. Effective exploits of the integer factorization problem in RSA can allow an adversary to assume the identity of the key holder and decrypt such confidential messages. The keys employed in secure hardware are particularly significant due to the typically greater value of the information they safeguard, such as in the context of securing payment transactions. In general, RSA faces various attacks exploiting weaknesses in its key equations. This paper introduces a new vulnerability that enables the concurrent factorization of multiple RSA moduli. By working with pairs <span><math><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>,</mo><msub><mrow><mi>e</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>)</mo></mrow></math></span> and a fixed value <span><math><mi>y</mi></math></span> satisfying the Diophantine equation <span><math><mrow><msub><mrow><mi>e</mi></mrow><mrow><mi>i</mi></mrow></msub><msubsup><mrow><mi>x</mi></mrow><mrow><mi>i</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>−</mo><msup><mrow><mi>y</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>ϕ</mi><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>)</mo></mrow><mo>=</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></math></span>, we successfully factorized these moduli simultaneously using the lattice basis reduction technique. Notably, our research expands the scope of RSA decryption exponents considered as insecure.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001630/pdfft?md5=44eab7f8011fba6e4c09c111ca655fc8&pid=1-s2.0-S1319157824001630-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new version of the greedy perimeter stateless routing scheme in flying ad hoc networks 飞行临时网络中的新版贪婪周边无状态路由方案
IF 6.9 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-05-23 DOI: 10.1016/j.jksuci.2024.102066
Mehdi Hosseinzadeh , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Jan Lansky , Hong Min
{"title":"A new version of the greedy perimeter stateless routing scheme in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Jan Lansky ,&nbsp;Hong Min","doi":"10.1016/j.jksuci.2024.102066","DOIUrl":"10.1016/j.jksuci.2024.102066","url":null,"abstract":"<div><p>Flying ad hoc networks (FANETs) belong to the family of mobile ad hoc networks (MANETs). They have gained high popularity due to their extensive applications in various industries such as emergency management, military missions, and supervision. However, these networks face important challenges in guaranteeing reliable data transmission because of their dynamic nature and lack of infrastructure. In this paper, a new version of the greedy perimeter stateless routing scheme called GPSR+AODV is proposed in FANET. It combines two routing schemes, namely GPSR and AODV, and is a family member of geographic routing methods. In GPSR+AODV, each UAV consists of a certain hello broadcast period that is adjusted based on the prediction of its spatial coordinates in the future. Additionally, GPSR+AODV modifies the greedy forwarding process and restricts the search space for finding the next-hop node by obtaining a refined candidate set, calculated in the cylindrical coordinate system. Then, each UAV in the refined candidate set is evaluated under a fitness function, and the most suitable next-hop node with the maximum fitness is determined. This function is a combination of four criteria, namely relative velocity, energy level, buffer capacity, and distance to destination. When failing in the greedy forwarding process, GPSR+AODV changes the forwarding technique and uses an AODV-based perimeter forwarding technique to select the best next-hop node. Lastly, GPSR+AODV is implemented by the NS2 simulator, and the simulation results show a successful performance in terms of packet delivery rate, throughput, and delay compared to AGGR, AeroRP, and GPSR. However, the routing overhead in the proposed scheme is higher than that in AGGR.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001551/pdfft?md5=090b62843e6787b9d53b245142377160&pid=1-s2.0-S1319157824001551-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141144555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信