Computers & Electrical Engineering最新文献

筛选
英文 中文
PTSRDet: End-to-End Super-Resolution and object-detection approach for small defect detection of power transmission lines 输电线路小缺陷检测的端到端超分辨率和目标检测方法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-05-01 DOI: 10.1016/j.compeleceng.2025.110374
Shahrzad Falahatnejad , Azam Karami , Hossein Nezamabadi-pour
{"title":"PTSRDet: End-to-End Super-Resolution and object-detection approach for small defect detection of power transmission lines","authors":"Shahrzad Falahatnejad ,&nbsp;Azam Karami ,&nbsp;Hossein Nezamabadi-pour","doi":"10.1016/j.compeleceng.2025.110374","DOIUrl":"10.1016/j.compeleceng.2025.110374","url":null,"abstract":"<div><div>Detecting small defects in power transmission lines is crucial for ensuring the safety and reliability of power grids. Unmanned Aerial Vehicle (UAV) imagery can be utilized for this purpose; however, the small size of defects and the low resolution of images make this task challenging. In this paper, we introduce a novel model that combines super-resolution and object detection techniques to address this issue. Our approach employs a Power Transmission Lines Single Image Super-Resolution Generative Adversarial Network (PTSRGAN) for super-resolution, and a new architecture for object detection that includes the HorNet backbone, a Super-Resolution based Path Aggregation Feature Pyramid Network (SR-PAFPN) neck, and a You Only Look Once-X (YOLOX) decoupled head.</div><div>The SR-PAFPN neck enhances feature quality and diversity, particularly for small defects, by integrating feature super-resolution during training. To further improve the accuracy of small defect detection, our model is trained end-to-end, allowing the super-resolution model to receive feedback from the object detection model and adapt accordingly. Extensive experiments demonstrate the effectiveness and efficiency of our Power Transmission Lines Super Resolution Defect Detection (PTSRDet) method. Our model achieves a precision of 92.87% and a recall of 96.32%, processing each image in just 0.34 s. These results highlight the model’s capability to accurately detect small defects in power transmission lines, making it a valuable contribution to the field.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110374"},"PeriodicalIF":4.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143886383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative and distributive intelligence in radar systems: Enhancing electronic jamming discrimination 雷达系统中的协同和分布式智能:增强电子干扰识别
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-05-01 DOI: 10.1016/j.compeleceng.2025.110357
Purabi Sharma, Kandarpa Kumar Sarma
{"title":"Collaborative and distributive intelligence in radar systems: Enhancing electronic jamming discrimination","authors":"Purabi Sharma,&nbsp;Kandarpa Kumar Sarma","doi":"10.1016/j.compeleceng.2025.110357","DOIUrl":"10.1016/j.compeleceng.2025.110357","url":null,"abstract":"<div><div>The precise discrimination of radar jamming signals is decisive in executing effective electronic counter-countermeasures (ECCM). Data-driven deep learning (DL) models have proven effective for this task, but challenges persist in addressing critical real-world issues such as limited data sharing, time- and location-dependent variations in hostile interferences, real-time adaptability to evolving jamming tactics, and imbalanced data distribution. In this paper, a novel approach is proposed that employs federated learning (FL) for training radar signal jamming classifiers individually on a set of devices, aggregating, sharing, and continuously updating the knowledge. This approach enables privacy-preserving training, eliminating access to client-local data or centralized data storage, ensuring knowledge sharing, and resilient response to jamming. This work delineates a collaborative and distributive learning framework for radar jamming signals, employing two hybrid models within an FL platform. A deep spectra spatio-temporal discriminator (DSSTD) and a shallow spectra-temporal feed-forward self-attention-driven discriminator (SSTFSAD) network have been implemented as classifiers on a distributed arrangement. The time–frequency attributes of radar jamming signals as 2D-scalograms individually train these models across remote FL nodes. Extensive evaluations are conducted in FL environments under independently and identically distributed (IID) and non-IID data configurations, simulating real-world settings with diverse data distributions. Experimental results demonstrate that both proposed approaches are effective, with FL-driven DSSTD outperforming FL-driven SSTFSAD by 7.7% in IID and 6.8% in non-IID setups, even at -5 dB JNR. These results highlight the robustness and adaptability of the FL-driven DSSTD model, offering a significant advancement in radar jamming signal discrimination for electronic warfare applications.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110357"},"PeriodicalIF":4.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143886502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient anonymous certificateless authentication and key agreement scheme for smart grids 一种高效的智能电网匿名无证书认证与密钥协议方案
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-05-01 DOI: 10.1016/j.compeleceng.2025.110369
Qingfeng Cheng , Yuqian Ma , Fushan Wei , Xinghua Li
{"title":"An efficient anonymous certificateless authentication and key agreement scheme for smart grids","authors":"Qingfeng Cheng ,&nbsp;Yuqian Ma ,&nbsp;Fushan Wei ,&nbsp;Xinghua Li","doi":"10.1016/j.compeleceng.2025.110369","DOIUrl":"10.1016/j.compeleceng.2025.110369","url":null,"abstract":"<div><div>With the vibrant development of the Internet, smart grids have been provided with a suitable environment to flourish. Smart meters record and transmit electricity consumption information and send it to gateways and service providers. Power suppliers process the data to evaluate and predict the frequency of electricity consumption by users, to save resources. However, the power consumption information contained in the data may reveal users’ identity, community address or the frequency at home. If malicious attackers get these messages, the residential safety will be greatly threatened. Therefore, data needs to be protected. Authentication and key agreement protocol is a promising solution, which first realizes mutual authentication between communication parties, and then establishes a session key between them to protect transmitted data. Recently, Chai et al. proposed an authentication scheme based on SM2 authentication key exchange (AKE) protocol. Unfortunately, after our analysis, it is difficult to achieve forward security as they stated. Specifically, if the long term key of the communicating smart meter is leaked, the adversary can recover the session keys established before. Further, we propose a provable secure certificateless authentication and key agreement scheme. The security of the proposed scheme is analyzed by provable security and BAN logic. Compared with the existing scheme, our proposed scheme can achieve a better balance from the security properties, communication cost, and computation cost three aspects.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110369"},"PeriodicalIF":4.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143887244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technical assessment framework for cost-sharing agreements in transactive energy systems 交易能源系统费用分摊协议的技术评估框架
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-05-01 DOI: 10.1016/j.compeleceng.2025.110356
Daniel Galeano-Suárez , David Toquica , Nilson Henao , Kodjo Agbossou , JC Oviedo-Cepeda , Michael Fournier
{"title":"Technical assessment framework for cost-sharing agreements in transactive energy systems","authors":"Daniel Galeano-Suárez ,&nbsp;David Toquica ,&nbsp;Nilson Henao ,&nbsp;Kodjo Agbossou ,&nbsp;JC Oviedo-Cepeda ,&nbsp;Michael Fournier","doi":"10.1016/j.compeleceng.2025.110356","DOIUrl":"10.1016/j.compeleceng.2025.110356","url":null,"abstract":"<div><div>Transactive Energy Systems (TES) brought opportunities to innovate on electricity market designs and improve the economic efficiency and fairness of the grid. Cost-sharing (CS) mechanism designs are appealing in TES since they can provide fair electricity prices when acknowledging average operating costs. However, CS must consider the grid’s physical constraints to ensure the feasibility of transactions and avoid affecting service quality. For this reason, this paper introduces an assessment methodology for TES cost-sharing agreements that incorporates the physical limits of the grid, allocates the total system cost, and reduces information disclosure among participants. The proposed framework utilizes the aggregated consumption of residential customers to determine active and reactive power demands through probabilistic modeling. Subsequently, the expected values of electrical variables are computed through Monte-Carlo simulations of dynamic power flows and summarized in a transactive report. The report serves as an input to allocate penalty costs and modify demand patterns to comply with the grid safety limits. The TES assessment methodology is evaluated using the IEEE 33-bus distribution system. Study results demonstrate that the proposed Transactive Energy market, employing cost-sharing, effectively reduces the expected power consumption peaks. The results also highlight the efficacy of the proposed voltage and congestion penalty cost by encouraging users to shift consumption into safe limits.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110356"},"PeriodicalIF":4.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143886384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for detecting phishing crimes on Twitter using selective features and machine learning 使用选择性功能和机器学习来检测Twitter上的网络钓鱼犯罪的框架
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-28 DOI: 10.1016/j.compeleceng.2025.110363
Hina Rashid , Hannan Bin Liaqat , Muhammad Usman Sana , Tayybah Kiren , Hanen Karamti , Imran Ashraf
{"title":"Framework for detecting phishing crimes on Twitter using selective features and machine learning","authors":"Hina Rashid ,&nbsp;Hannan Bin Liaqat ,&nbsp;Muhammad Usman Sana ,&nbsp;Tayybah Kiren ,&nbsp;Hanen Karamti ,&nbsp;Imran Ashraf","doi":"10.1016/j.compeleceng.2025.110363","DOIUrl":"10.1016/j.compeleceng.2025.110363","url":null,"abstract":"<div><div>Socially aware information technology (SIT) plays a preferential role in facilitating the users for different tasks. Social media phishing is an escalating cybersecurity threat, where attackers employ deceptive tricks to steal personal data. Phishing detection in real-time is crucial, and highly dependent upon the selection of the most relevant features. Exiting literature often depends upon manual or random feature selection leading to inefficiencies in classification results. This research introduces a hybrid machine learning approach to phishing detection based on three feature selection methods Relief, Chi-square, and extra tree classifier for determining the most important features. Five classifiers including Naïve Bayes, support vector machine, decision tree, random forest (RF), and logistic regression are assessed based on accuracy, precision, recall, F1 score, and area under the curve (AUC). Experimental results indicate that RF obtains the highest accuracy of 95.56% and an AUC of 99.00%, better than other models and previous works. The results demonstrate the efficiency of the proposed method in improving phishing detection on social media.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110363"},"PeriodicalIF":4.0,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143879099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A privacy-preserving cross-chain cryptocurrency transfer scheme based on commitment scheme and zero-knowledge proof 一种基于承诺方案和零知识证明的保护隐私的跨链加密货币转移方案
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-28 DOI: 10.1016/j.compeleceng.2025.110373
Lu Lin , Lingyan Han , Liangmin Wang
{"title":"A privacy-preserving cross-chain cryptocurrency transfer scheme based on commitment scheme and zero-knowledge proof","authors":"Lu Lin ,&nbsp;Lingyan Han ,&nbsp;Liangmin Wang","doi":"10.1016/j.compeleceng.2025.110373","DOIUrl":"10.1016/j.compeleceng.2025.110373","url":null,"abstract":"<div><div>The demand for cross-chain transactions is increasing with the emergence of different types of cryptocurrencies. Most of solutions require cross-chain transaction information to be collected publicly, which undermines the privacy of cross-chain payers. To address this challenge, we propose a privacy-preserving scheme for cross-chain cryptocurrency transactions, which prevents any party from accessing the full transaction details of the payers. Based on the commitment scheme, we first construct a privacy-preserving cryptocurrency lock and release protocol for issuing or redeeming mapped cryptocurrencies in smart contracts. We then propose a mapped cryptocurrency confidential transaction scheme (MCCT) based on zk-SNARK and design an atomic exchange protocol based on it. We analyze the security of our scheme and implement it with smart contracts on an Ethereum test network. The experimental results demonstrate that for 100 exchanges, the additional time cost of our proposed solution is approximately 39% compared to the existing solution, which is considered acceptable.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110373"},"PeriodicalIF":4.0,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143878494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive survey on deoldifying images and videos 对图像和视频去污的综合调查
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-26 DOI: 10.1016/j.compeleceng.2025.110396
Aradhana Mishra, Bumshik Lee
{"title":"Comprehensive survey on deoldifying images and videos","authors":"Aradhana Mishra,&nbsp;Bumshik Lee","doi":"10.1016/j.compeleceng.2025.110396","DOIUrl":"10.1016/j.compeleceng.2025.110396","url":null,"abstract":"<div><div>In the field of image processing, Deoldify refers to the revitalization of aging visual media, such as historical photos and videos, which present unique challenges due to accumulated defects, unpredictable degradation, and physical damage. Traditional restoration techniques, such as manual retouching, chemical treatments, and manual colorization, are often insufficient for addressing the complexity of these tasks, particularly in areas such as denoising, super-resolution, brightness enhancement, deblurring, colorization, compression, and inpainting. These methods lack automation, scalability, and precision, especially when dealing with severely degraded media. This survey highlights the limitations of conventional approaches. We focus on how recent advancements in deep learning, including convolutional neural networks, variational autoencoders, generative adversarial networks, Transformers, and diffusion models, have surpassed traditional methods in these subtasks. By leveraging deep learning, tasks such as noise reduction, contrast restoration, and resolution enhancement are performed with greater accuracy and efficiency, significantly improving restoration outcomes. This work aims to provide a comprehensive review of these techniques, showcasing their superiority over traditional methods while identifying challenges such as dataset limitations and the need for better handling of extreme degradation,and proposing directions for future research in old media restoration.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110396"},"PeriodicalIF":4.0,"publicationDate":"2025-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143876539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing wind energy integration with fuzzy PID DSTACOM and hybrid MPPT for reduced harmonic distortion 利用模糊PID DSTACOM和混合MPPT优化风能集成以降低谐波失真
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-26 DOI: 10.1016/j.compeleceng.2025.110391
Shinagam Rajshekar, Lalit Chandra Saikia, Lavanya Nandyala
{"title":"Optimizing wind energy integration with fuzzy PID DSTACOM and hybrid MPPT for reduced harmonic distortion","authors":"Shinagam Rajshekar,&nbsp;Lalit Chandra Saikia,&nbsp;Lavanya Nandyala","doi":"10.1016/j.compeleceng.2025.110391","DOIUrl":"10.1016/j.compeleceng.2025.110391","url":null,"abstract":"<div><div>Wind Energy Conversion Systems (WECS) play a crucial role in renewable energy generation but face challenges such as fluctuating wind speeds and grid instability, leading to power quality issues and voltage fluctuations. This study proposes an advanced integration of a wind-connected grid with a Battery Energy Storage System (BESS), optimized through a fuzzy PID-controlled DSTATCOM and a hybrid Maximum Power Point Tracking (MPPT) algorithm combining Perturb and Observe (P&amp;O) with Incremental Conductance (InCon). The fuzzy PID-controlled DSTATCOM provides dynamic reactive power compensation, stabilizes voltage, and mitigates harmonic distortions, while the BESS ensures efficient energy storage and dispatch under varying wind conditions. Simulation results demonstrate a significant reduction in Total Harmonic Distortion (THD), with the DFIG current THD peaking at 10 % before stabilization, while grid and load currents were reduced to below 0.15 % and 0.02 %, respectively. The findings confirm that the proposed system enhances power extraction, minimizes harmonic distortions, and improves grid stability. These results suggest that the developed methodology provides a robust and efficient solution for integrating wind energy into modern smart grids.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110391"},"PeriodicalIF":4.0,"publicationDate":"2025-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143873706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A taxonomy of key management schemes of SCADA systems SCADA 系统密钥管理方案分类法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-25 DOI: 10.1016/j.compeleceng.2025.110366
Pramod TC
{"title":"A taxonomy of key management schemes of SCADA systems","authors":"Pramod TC","doi":"10.1016/j.compeleceng.2025.110366","DOIUrl":"10.1016/j.compeleceng.2025.110366","url":null,"abstract":"<div><div>The communication messages exchanged between industrial plant devices contain sensitive data. Secure communication plays a vital role in securing the communications of industrial devices. A key management mechanism is necessary for automation systems to handle the crypto keys used for secure communication. This paper focuses on presenting a framework for evaluating key management schemes specific to SCADA (Supervisory Control and Data Acquisition) requirements. It also aims to present a detailed review of key management schemes proposed for SCADA systems. The review considered the symmetric, asymmetric, and hybrid schemes, quantum key distribution, and blockchain-based key management schemes of SCADA systems. The paper outlines the existing SCADA key management schemes highlighting the benefits, limitations, and future scope. The future directions give the research gaps of SCADA key management schemes and possible research scope in the key management domain for industrial system security.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110366"},"PeriodicalIF":4.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks HaKAN-6T:在基于rpl的6TiSCH网络中使用CoJP检测和缓解DIS攻击的混合算法
IF 4 3区 计算机科学
Computers & Electrical Engineering Pub Date : 2025-04-25 DOI: 10.1016/j.compeleceng.2025.110362
Hakan Aydin, Burak Aydin, Sedat Gormus
{"title":"HaKAN-6T: Hybrid algorithm for DIS attack detection and mitigation using CoJP in RPL-based 6TiSCH networks","authors":"Hakan Aydin,&nbsp;Burak Aydin,&nbsp;Sedat Gormus","doi":"10.1016/j.compeleceng.2025.110362","DOIUrl":"10.1016/j.compeleceng.2025.110362","url":null,"abstract":"<div><div>The Internet of Things relies on robust networking protocols like the Routing Protocol for Low-Power and Lossy Networks (RPL) to enable efficient communication in resource-constrained environments, particularly in 6TiSCH networks combining IEEE 802.15.4e TSCH with IPv6. However, RPL remains vulnerable to control message attacks, such as DIS flooding and rank manipulation, which degrade network stability, increase energy consumption, and disrupt performance. To address these challenges, this study introduces HaKAN-6T, a hybrid security framework designed to enhance RPL-based 6TiSCH networks through integrated detection and mitigation mechanisms. HaKAN-6T combines the Constrained Join Protocol (CoJP) for secure device authentication with a Network Analyzer for real-time anomaly detection. CoJP ensures only authorized devices join the network, preventing unauthorized access, while the Network Analyzer monitors node behavior to identify attacks like DIS flooding, increased rank, and decreased rank attacks. The performance of HaKAN-6T is evaluated through extensive simulations in grid and random topologies with 30 and 40 nodes, measuring key metrics such as packet delivery ratio (PDR), end-to-end delay (E2ED), control packet overhead, average power consumption (APC), processing overhead, and average detection latency. The results demonstrate that HaKAN-6T significantly mitigates the impact of DIS flooding attacks, reducing control packet overhead by up to 28.5% and improving PDR from 82.7% to 88.45% in 30-node scenarios. Against increased rank attacks, it minimizes E2ED, reducing delays by 19.3% while maintaining a stable network topology. For decreased rank attacks, it prevents excessive topology changes and lowers APC by up to 10.5%, enhancing energy efficiency.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110362"},"PeriodicalIF":4.0,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143867933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信