Pervasive and Mobile Computing最新文献

筛选
英文 中文
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation 利用全分布式行为指纹和安全授权的新型物联网信任模型
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-02-08 DOI: 10.1016/j.pmcj.2024.101889
Marco Arazzi , Serena Nicolazzo , Antonino Nocera
{"title":"A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation","authors":"Marco Arazzi ,&nbsp;Serena Nicolazzo ,&nbsp;Antonino Nocera","doi":"10.1016/j.pmcj.2024.101889","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101889","url":null,"abstract":"<div><p>The pervasiveness and high number of Internet of Things (IoT) applications in people’s daily lives make this context a very critical attack surface for cyber threats. The high heterogeneity of involved entities, both in terms of hardware and software characteristics, does not allow the definition of uniform, global, and efficient security solutions. Therefore, researchers have started to investigate novel mechanisms, in which a super node (a gateway, a hub, or a router) analyzes the interactions of the target node with other peers in the network, to detect possible anomalies. The most recent of these strategies base such an analysis on the modeling of the fingerprint of a node behavior in an IoT; nevertheless, existing solutions do not cope with the fully distributed nature of the referring scenario.</p><p>In this paper, we try to provide a contribution in this setting, by designing a novel and fully distributed trust model exploiting point-to-point devices’ behavioral fingerprints, a distributed consensus mechanism, and Blockchain technology. In our solution we tackle the non-trivial issue of equipping smart things with a secure mechanism to evaluate, also through their neighbors, the trustworthiness of an object in the network before interacting with it. Beyond the detailed description of our framework, we also illustrate the security model associated with it and the tests carried out to evaluate its correctness and performance.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000154/pdfft?md5=e7b2906244cfb05dbee063203a65f60e&pid=1-s2.0-S1574119224000154-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139738296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of mobility sampling in dynamic networks using predictive wavelet analysis 利用预测小波分析优化动态网络中的移动采样
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-02-01 DOI: 10.1016/j.pmcj.2024.101887
Peppino Fazio , Miralem Mehic , Floriano De Rango , Mauro Tropea , Miroslav Voznak
{"title":"Optimization of mobility sampling in dynamic networks using predictive wavelet analysis","authors":"Peppino Fazio ,&nbsp;Miralem Mehic ,&nbsp;Floriano De Rango ,&nbsp;Mauro Tropea ,&nbsp;Miroslav Voznak","doi":"10.1016/j.pmcj.2024.101887","DOIUrl":"10.1016/j.pmcj.2024.101887","url":null,"abstract":"<div><p>In the last decade, the investigation of mobility features has gained enormous significance in many scenarios as a result of the significant diffusion and deployment of mobile devices covered by high-speed technologies (e.g., 5G). Many contributions in the literature have attempted to discover mobility properties, but most studies are based on the time features of the mobility process. No study has yet considered the effects of setting a proper sampling frequency (generally set to 1 s), in order to avoid information loss. Following our previous works, we propose a novel predictive spectral approach for mobility sampling based on the concept of a predictive wavelet. With this method, the choice of sampling frequency is governed by the current spectral components of the mobility process and derived from an analysis of future, predicted components. To assess whether our proposal may yield a helpful method, we conducted several simulation campaigns to test sampling accuracy and obtained results that confirmed our expectations.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000130/pdfft?md5=4ee4cc1275b8ee0647dbfa8fed17e7b2&pid=1-s2.0-S1574119224000130-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139669507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment B2auth:用于真实世界部署的上下文细粒度行为生物识别身份验证框架
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-24 DOI: 10.1016/j.pmcj.2024.101888
Ahmed Mahfouz , Ahmed Hamdy , Mohamed Alaa Eldin , Tarek M. Mahmoud
{"title":"B2auth: A contextual fine-grained behavioral biometric authentication framework for real-world deployment","authors":"Ahmed Mahfouz ,&nbsp;Ahmed Hamdy ,&nbsp;Mohamed Alaa Eldin ,&nbsp;Tarek M. Mahmoud","doi":"10.1016/j.pmcj.2024.101888","DOIUrl":"10.1016/j.pmcj.2024.101888","url":null,"abstract":"<div><p>Several behavioral biometric authentication frameworks have been proposed to authenticate smartphone users based on the analysis of sensors and services. These authentication frameworks verify the user identity by extracting a set of behavioral traits such as touch, sensors and keystroke dynamics, and use machine learning and deep learning techniques to develop the authentication models. Unfortunately, it is not clear how these frameworks perform in the real world deployment and most of the experiments in the literature have been conducted with cooperative users in a controlled environment. In this paper, we present a novel behavioral biometric authentication framework, called B2auth, designed specifically for smartphone users. The framework leverages raw data collected from touchscreen on smartphone to extract behavioral traits for authentication. A Multilayer Perceptron (MLP) neural network is employed to develop authentication models. Unlike many existing experiments conducted in controlled environments with cooperative users, we focused on real-world deployment scenarios, collecting data from 60 participants using smartphones in an uncontrolled environment. The framework achieves promising results in differentiating the legitimate owner and an attacker across various app contexts, showcasing its potential in practical use cases. By utilizing minimalist data collection and cloud-based model generation, the B2auth framework offers an efficient and effective approach to behavioral biometric authentication for smartphones.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139578059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks 基于联合学习的城市感知应用对抗推理攻击的计算和通信高效方法
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-09 DOI: 10.1016/j.pmcj.2024.101875
Ayshika Kapoor, Dheeraj Kumar
{"title":"Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks","authors":"Ayshika Kapoor,&nbsp;Dheeraj Kumar","doi":"10.1016/j.pmcj.2024.101875","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101875","url":null,"abstract":"<div><p><span><span>Federated learning based participatory sensing has gained much attention lately for the vital task of urban sensing due to privacy and security issues in conventional </span>machine learning<span><span><span>. However, inference attacks by the honest-but-curious application server or a </span>malicious adversary<span> can leak the personal attributes of the participants, such as their home and workplace locations, routines, and habits. Approaches proposed in the literature to prevent such information leakage, such as secure multi-party computation and </span></span>homomorphic encryption<span>, are infeasible for urban sensing applications owing to high communication and computation costs due to multiple rounds of communication between the user and the server. Moreover, for effective modeling of urban sensing phenomenon, the application model needs to be updated frequently — every few minutes or hours, resulting in periodic data-intensive updates by the participants, which severely strains the already limited resources of their mobile devices<span>. This paper proposes a novel low-cost privacy-preserving framework for enhanced protection against the inference of participants’ personal and private attributes from the data leaked through inference attacks. We propose a novel approach of </span></span></span></span><em>strategically</em><span> leaking selected location traces by providing computation and communication-light direct (local) model updates, whereas the rest of the model updates (when the user is at sensitive locations) are provided using secure multi-party computation. We propose two new methods based on spatiotemporal entropy and Kullback–Leibler divergence for automatically deciding which model updates need to be sent through secure multi-party computation and which can be sent directly. The proposed approach significantly reduces the computation and communication overhead for participants compared to the fully secure multi-party computation protocols. It provides enhanced protection against the deduction of personal attributes from inferred location traces compared to the direct model updates by confusing the application server or malicious adversary while inferring personal attributes from location traces. Numerical experiments on the popular Geolife GPS trajectories dataset validate our proposed approach by reducing the computation and communication requirements by the participants significantly and, at the same time, enhancing privacy by decreasing the number of inferred sensitive and private locations of participants.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139433384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor-based agitation prediction in institutionalized people with dementia A systematic review 基于传感器的痴呆症住院患者躁动预测系统综述
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-07 DOI: 10.1016/j.pmcj.2024.101876
Jan Kleine Deters , Sarah Janus , Jair A. Lima Silva , Heinrich J. Wörtche , Sytse U. Zuidema
{"title":"Sensor-based agitation prediction in institutionalized people with dementia A systematic review","authors":"Jan Kleine Deters ,&nbsp;Sarah Janus ,&nbsp;Jair A. Lima Silva ,&nbsp;Heinrich J. Wörtche ,&nbsp;Sytse U. Zuidema","doi":"10.1016/j.pmcj.2024.101876","DOIUrl":"10.1016/j.pmcj.2024.101876","url":null,"abstract":"<div><p>Early detection of agitation in individuals with dementia can lead to timely interventions, preventing the worsening of situations and enhancing their quality of life. The emergence of multi-modal sensing and advances in artificial intelligence make it feasible to explore and apply technology for this goal. We conducted a literature review to understand the current technical developments and challenges of its integration in caregiving institutions. Our systematic review used the Pubmed and IEEE scientific databases, considering studies from 2017 onwards. We included studies focusing on linking sensor data to vocal and/or physical manifestations of agitation. Out of 1622 identified studies, 12 were selected for the final review. Analysis was conducted on study design, technology, decisional data, and data analytics. We identified a gap in the standardized semantic representation of both behavioral descriptions and system event generation configurations. This research highlighted initiatives that leverage existing information in a caregiver's routine, such as correlating electronic health records with sensor data. As predictive systems become more integrated into caregiving routines, false positive reduction needs to be addressed as those will discourage their adoption. Therefore, to ensure adaptive predictive capacity and personalized system re-configuration, we suggest future work to evaluate a framework that incorporates a human-in-the-loop approach for detecting and predicting agitation.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000026/pdfft?md5=f6a8397ac6e02acc44ce653a7d1a2e87&pid=1-s2.0-S1574119224000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139456701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images 从智能手机图像中检测 mpox 的迁移学习和可解释解决方案
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-06 DOI: 10.1016/j.pmcj.2023.101874
Mattia Giovanni Campana , Marco Colussi , Franca Delmastro , Sergio Mascetti , Elena Pagani
{"title":"A Transfer Learning and Explainable Solution to Detect mpox from Smartphones images","authors":"Mattia Giovanni Campana ,&nbsp;Marco Colussi ,&nbsp;Franca Delmastro ,&nbsp;Sergio Mascetti ,&nbsp;Elena Pagani","doi":"10.1016/j.pmcj.2023.101874","DOIUrl":"10.1016/j.pmcj.2023.101874","url":null,"abstract":"<div><p>Monkeypox (mpox) virus has become a “public health emergency of international concern” in the last few months, as declared by the World Health Organization, especially for low-income countries. A symptom of mpox infection is the appearance of rashes and skin eruptions, which can lead people to seek medical advice. A technology that might help perform a preliminary screening based on the aspect of skin lesions is the use of Machine Learning<span><span> for image classification. However, to make this technology suitable on a large scale, it should be usable directly on people </span>mobile devices, with a possible notification to a remote medical expert.</span></p><p><span>In this work, we investigate the adoption of Deep Learning<span> to detect mpox from skin lesion images derived from smartphone cameras. The proposal leverages Transfer Learning to cope with the scarce availability of mpox image datasets. As a first step, a homogeneous, unpolluted, dataset was produced by manual selection and preprocessing of available image data, publicly released for research purposes. Subsequently, we compared multiple </span></span>Convolutional Neural Networks<span> (CNNs) using a rigorous 10-fold stratified cross-validation approach and we conducted an analysis to evaluate the models’ fairness towards different skin tones. The best models have been then optimized through quantization for use on mobile devices; measures of classification quality, memory footprint<span>, and processing times validated the feasibility of our proposal. The most favorable outcomes have been achieved by MobileNetV3Large, attaining an F-1 score of 0.928 in the binary task and 0.879 in the multi-class task. Furthermore, the application of quantization led to a reduction in the model size to less than one-third, while simultaneously decreasing the inference time from 0.016 to 0.014 s, with only a marginal loss of 0.004 in F-1 score. Additionally, the use of eXplainable AI has been investigated as a suitable instrument to both technically and clinically validate classification outcomes.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based access control architecture for multi-domain environments 基于区块链的多域环境访问控制架构
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-06 DOI: 10.1016/j.pmcj.2024.101878
Zhiqiang Du , Yunliang Li , Yanfang Fu , Xianghan Zheng
{"title":"Blockchain-based access control architecture for multi-domain environments","authors":"Zhiqiang Du ,&nbsp;Yunliang Li ,&nbsp;Yanfang Fu ,&nbsp;Xianghan Zheng","doi":"10.1016/j.pmcj.2024.101878","DOIUrl":"10.1016/j.pmcj.2024.101878","url":null,"abstract":"<div><p><span>Numerous users from diverse domains access information and perform various operations in multi-domain environments. These users have complex permissions that increase the risk of identity falsification, unauthorized access, and privacy breaches during cross-domain interactions. Consequently, implementing an access control architecture to prevent users from engaging in illicit activities is imperative. This paper proposes a novel blockchain-based access control architecture for multi-domain environments. By integrating the multi-domain environment within a federated chain, the architecture utilizes Decentralized Identifiers (DIDs) for user identification and relies on public/secret key pairs for operational execution. Verifiable credentials are used to authorize permissions and release resources, thereby ensuring </span>authentication<span> and preventing tampering and forgery. In addition, the architecture automates the authorization and access control processes through smart contracts<span>, thereby eliminating human intervention. Finally, we performed a simulation evaluation of the architecture. The most time-consuming process had a runtime of 1074 ms, primarily attributed to interactions with the blockchain. Concurrent testing revealed that with a concurrency level of 2000 demonstrated that the response times for read and write operations were maintained within 1000 ms and 4600 ms, respectively. In terms of storage efficiency, except for user registration, which incurred two gas charges, all the other processes required only one charge.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things 用于触觉式工业物联网的安全实用的端到端认证方案
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-06 DOI: 10.1016/j.pmcj.2024.101877
Yimin Guo , Yajun Guo , Ping Xiong , Fan Yang , Chengde Zhang
{"title":"A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things","authors":"Yimin Guo ,&nbsp;Yajun Guo ,&nbsp;Ping Xiong ,&nbsp;Fan Yang ,&nbsp;Chengde Zhang","doi":"10.1016/j.pmcj.2024.101877","DOIUrl":"10.1016/j.pmcj.2024.101877","url":null,"abstract":"<div><p><span>In the Industrial Internet of Things (IIoT), </span>haptic<span><span><span> control of machines or robots can be managed remotely. However, with the emergence of Tactile Industrial Internet of Things (TIIoT), the transmission of haptic data over public channels has raised security and privacy concerns. In such an environment, mutual authentication between haptic users and remotely controlled entities is crucial to prevent illegal control by adversaries. Therefore, we propose an end-to-end </span>authentication scheme, SecTIIoT, to establish secure communication between haptic users and remote </span>IoT<span> devices. The scheme addresses security issues by using lightweight hash cryptographic primitives and employs a useful piggyback strategy to improve authentication efficiency. We demonstrate that SecTIIoT is resilient to various known attacks with formal security proofs and informal security analysis. Furthermore, our detailed performance analysis shows that SecTIIoT outperforms existing lightweight authentication schemes as it provides more security features while reducing computation and communication costs.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication SMARTCOPE:用于持续验证的智能手机所有权变更评估
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-01 DOI: 10.1016/j.pmcj.2023.101873
Nicholas Cariello , Seth Levine , Gang Zhou , Blair Hoplight , Paolo Gasti , Kiran S. Balagani
{"title":"SMARTCOPE: Smartphone Change Of Possession Evaluation for continuous authentication","authors":"Nicholas Cariello ,&nbsp;Seth Levine ,&nbsp;Gang Zhou ,&nbsp;Blair Hoplight ,&nbsp;Paolo Gasti ,&nbsp;Kiran S. Balagani","doi":"10.1016/j.pmcj.2023.101873","DOIUrl":"10.1016/j.pmcj.2023.101873","url":null,"abstract":"<div><p><span><span>The goal of continuous smartphone authentication is to detect when the adversary has gained possession of the user’s device post-login. This is achieved by triggering re-authentication at fixed, frequent intervals. However, these intervals do not take into account external information that might indicate that the impostor has gained physical access to the user’s device. Continuous smartphone authentication typically relies on behavioral cues, such as hand movement and touchscreen swipes, that can be collected without interrupting the user’s activity. Because these behavioral signals are characterized by relatively high error rates compared to physiological </span>biometrics, their use at fixed intervals leads to unnecessary interruptions to the user’s activity in case of a false reject, </span><em>and</em> to not recognizing the impostor in case of a false accept.</p><p>To address these issues, in this paper we introduce a novel framework called SMARTCOPE: <em>Smartphone Change Of Possession Evaluation</em><span>. In this work, SMARTCOPE leverages smartphone movement signals collected during user activity to determine when the smartphone is no longer in the hands of its owner. When this occurs, SMARTCOPE triggers re-authentication. By using these signals, we are able to reduce the total number of re-authentication points while simultaneously lowering re-authentication error rates. Our analysis shows that our technique can reduce equal error rates<span> by over 40%, from 7.8% to 4.6% using movement and keystroke features. Further, we show that SMARTCOPE can be used to transform a static (login-time) authentication system, such as face recognition, to a continuous re-authentication system, with a significant increase in security and limited impact on usability.</span></span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139027832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method 基于低功耗和有损网络的新型移动物联网轻量级路由协议--使用模糊逻辑方法
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-01-01 DOI: 10.1016/j.pmcj.2023.101872
Zahra Ghanbari , Nima Jafari Navimipour , Mehdi Hosseinzadeh , Hassan Shakeri , Aso Darwesh
{"title":"A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method","authors":"Zahra Ghanbari ,&nbsp;Nima Jafari Navimipour ,&nbsp;Mehdi Hosseinzadeh ,&nbsp;Hassan Shakeri ,&nbsp;Aso Darwesh","doi":"10.1016/j.pmcj.2023.101872","DOIUrl":"10.1016/j.pmcj.2023.101872","url":null,"abstract":"<div><p><span><span>The IoT<span> devices with embedded mobile devices create the Internet of Mobile Things (IoMT) paradigm. Mobility is not supported by the routing protocol for low-power and lossy networks (RPL) created for static networks. IoMT has raised routing challenges such as link failure, instability, energy depletion, </span></span>packet loss<span>, and handover delay in the network. In this context, IoMT Fuzzy-based RPL (IoMT-FRPL) is proposed in this paper to enhance routing performance. Receiving Signal Strength Indicator (RSSI), </span></span>Euclidean distance<span>, Hop Count, and Expected Transmission Count (ETX) metrics are built into the fuzzy interface system for the mobile nodes in the network to conserve energy. The IoMT-FRPL consists of the following three key steps: The first steps are data transmission and motion investigation, the second is fuzzy-based prediction of a new static parent for the mobile node, and the third is verifying the unique attachment point. When conventional RPL, mRPL, and EMA-RPL were compared to IoMT-performance FRPL's in Cooja/Contiki 2.7, the simulation results revealed improvements in energy consumption, handover delay, packet delivery rate (PDR), and signaling cost.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信