{"title":"LbPV: Lattice-based Privacy-preserving mutual authentication scheme for VANET","authors":"Himun Jyoti Nath, Hiten Choudhury","doi":"10.1016/j.compeleceng.2024.109765","DOIUrl":"10.1016/j.compeleceng.2024.109765","url":null,"abstract":"<div><div>This study addresses the critical challenge of achieving reliable message exchange among vehicles in Vehicular Ad-hoc Networks (VANETs). It is crucial to quickly share safety messages, traffic updates, available services, and road conditions among vehicles in VANETs. For security reasons, messages must originate exclusively from authenticated vehicles, ensuring secure message exchange and data privacy. Numerous schemes for privacy-preserving authentication have been proposed, yet they suffer from constant service provider involvement and the requirement for vehicles to generate parameters on the fly. To address these challenges, this paper introduces LbPV, a secure lattice-based privacy-preserving mutual authentication scheme emphasizing the reliability of messages, preventing spoofing and unauthorized access. LbPV eliminates service provider monitoring and allows vehicles to authenticate messages without generating parameters while on the move. This is achieved by exchanging a confidential token using lattice-based encryption and message signing. By verifying the signed message and using the shared token, receiving vehicles can confirm the authenticity of the messages. By using lattice-based cryptography, the proposed protocol is also designed with the potential to resist future attacks, including quantum attacks, enhancing its long-term security viability. The security analysis of LbPV includes formal and informal evaluations that demonstrate its robustness. Performance evaluations using the NTL library show that LbPV, with service provider parameters, outperforms existing approaches in the literature. Results of performance analysis indicate that when compared to the most efficient traditional non-lattice-based scheme discussed in this paper, the proposed protocol has increased computation cost, communication cost, and power consumption by 77.71%, 98.58%, and 77.71%, respectively. Conversely, when compared to the most efficient lattice-based scheme discussed in this paper, the proposed scheme demonstrates reductions in computation cost, communication cost, and power consumption by 71.95%, 2.16%, and 71.95%, respectively.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109765"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A robust secret data sharing through coverless video steganography based on average DC coefficient on bit plane segmentation","authors":"Sourabh Debnath, Ramesh Kumar Mohapatra, Ratnakar Dash","doi":"10.1016/j.compeleceng.2024.109766","DOIUrl":"10.1016/j.compeleceng.2024.109766","url":null,"abstract":"<div><div>Recently, coverless steganography has been gaining popularity in confidential information-hiding techniques due to its resistance to the detection of steganalysis. Whereas most coverless approaches are based on images as the transmission medium, few articles are based on video in coverless steganography. Whereas the hiding capacity per frame in the existing scheme is less, and to improve the capacity, a new secret data sharing through coverless video steganography is proposed based on the average Direct Current (DC) coefficient on the Bit plane. The bit planes are extracted from the video frame, generating multiple hash sequences from each bit plane. The bit plane is further partitioned into blocks. The average DC coefficient of consecutive subblocks within a block in a bit plane frame is compared to create the hash bit sequences. A video index database is created to store the generated hash sequences for easy retrieval. The receiver successfully recovered the secret information from the retrieval information and received videos. The observed findings show that the suggested method outperforms recent coverless video steganography techniques. The robustness is substantially stronger and superior to other existing schemes.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109766"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel DDoS detection method using multi-layer stacking in SDN environment","authors":"Tasnim Alasali, Omar Dakkak","doi":"10.1016/j.compeleceng.2024.109769","DOIUrl":"10.1016/j.compeleceng.2024.109769","url":null,"abstract":"<div><div>Software Defined Network (SDN) offers virtualized services compatible with infrastructure hosted computing, presenting a flexible, adaptive, and economical network architecture. Switches used in SDN prioritize packet matching in flow tables above packet processing, leaving them open to Denial of Service (DoS) attacks. These attacks, exemplified by Distributed Denial of Service Attacks (DDoS), target a victim while using many infected workstations at once. Due to its scalability and programmability, SDN is being used more and more for network management. However, it has specific security concerns, such as the controller’s susceptibility to cyberattacks, which might result in a single point of failure and network-wide risks. This study proposes a novel DDoS prediction model by developing stacking classifier model consisting of multiple base classifiers for an SDN environment. The proposed model is built on stacking several classifiers at the base level and the Meta level, which mixes varied or heterogeneous learners to provide reliable model results. The findings demonstrate that the proposed stacking model outperforms other existing models with respect to accuracy, sensitivity, specificity, precision, and F1 score. Finally, the stacking classifier model is evaluated in terms of binary classification. The evaluation shows the highest AUC of 0.9537 whereas Random Forest, Decision Tree, and Logistic Regression achieve AUC values around 0.93–0.95.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109769"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-faceted sustainability improvement in low voltage power distribution network employing DG and capacitor bank","authors":"Pappu Kumar Saurav, Swapna Mansani, Partha Kayal","doi":"10.1016/j.compeleceng.2024.109789","DOIUrl":"10.1016/j.compeleceng.2024.109789","url":null,"abstract":"<div><div>Efficient distribution of active and reactive power in distribution networks is crucial for ensuring that consumer demand is met and that electrical power quality is maintained. This requires careful planning, particularly in terms of optimally placing and sizing distributed generator (DG) and capacitor bank (CB) units. These units play a key role in minimizing power losses and voltage fluctuations within the network. However, implementing DG and CB units in unbalanced distribution networks presents unique challenges due to inherent system unbalances. To address these challenges, this article proposes a method for allocating and sizing DG and CB units in unbalanced distribution networks. The approach accounts for the network's unbalance and targets multiple objectives, such as reducing power losses, improving multi-phase voltage stability, and minimizing phase-to-phase voltage unbalance. The fast and flexible radial power flow (FFRPF) technique is employed to model complex interactions and constraints within the network, leading to a multi-objective optimization problem. This optimization problem is solved using the weight aggregated particle swarm optimization (WA-PSO) method, a variant of particle swarm optimization tailored for multi-objective functions. WA-PSO simplifies the process by combining multiple objectives into a single function using weighted aggregation. The efficacy of this approach is validated on 19, 34, and 123-node unbalanced radial distribution networks (URDNs). The results show significant improvements in power delivery efficiency across all tested networks, especially when DG and CB units are operated simultaneously. Specifically, DG and CB integration led to a reduction in system losses by 89.90 %, 88.42 %, and 86.87 %, and a decrease in three-phase voltage unbalance indices by 88.75 %, 81.68 %, and 39.05 %, for the 19, 34, and 123-node systems, respectively, while maintaining voltage stability within acceptable limits. Additionally, CO<sub>2</sub> emissions were reduced by 52 %, 62 %, and 53 % when microturbines were utilized instead of coal-based thermal power plants, further highlighting the environmental benefits of the proposed approach.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109789"},"PeriodicalIF":4.0,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelkarim Zemmouri, Anass Barodi, Rachid Elgouri, Mohammed Benbrahim
{"title":"Proposal automatic water purging system for machinery in high humidity environments controlled by an ECU","authors":"Abdelkarim Zemmouri, Anass Barodi, Rachid Elgouri, Mohammed Benbrahim","doi":"10.1016/j.compeleceng.2024.109775","DOIUrl":"10.1016/j.compeleceng.2024.109775","url":null,"abstract":"<div><div>This paper presents an advanced automatic water discharge system tailored for diesel-powered machinery, particularly for vehicles operating in diverse climates, including humid coastal regions. The system is designed to protect fuel circuits in tanks and diesel engines of boats, offering either automatic or semi-automatic protection against oxidation and corrosion. This enhancement extends the lifespan of diesel components and pipelines while simultaneously reducing maintenance costs and intervention times. Additionally, the system improves fuel purity, resulting in increased engine power and efficiency. The proposed solution was experimentally validated using an Arduino board coupled with a water-sensitive detector in diesel fuel, suitable for installation in diesel filters or tanks. Experimental findings demonstrated a remarkably swift separation time of 150 microseconds for diesel and water at a pressure of 1 bar, achieving an impressive efficiency of 99.84%. The system's rapid and effective separation capability highlights its practical value, particularly in scenarios where efficient water removal is critical to sustaining engine performance and longevity.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109775"},"PeriodicalIF":4.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majid Ali , Mohsin Ali Koondhar , Jyotsna Ogale , Ahmed Ali , Baseem Khan
{"title":"Corrigendum to “Intelligent hybrid energy system and grid integration using microcontrollers” [Computers and Electrical Engineering, Volume 110, September 2023, 108873]","authors":"Majid Ali , Mohsin Ali Koondhar , Jyotsna Ogale , Ahmed Ali , Baseem Khan","doi":"10.1016/j.compeleceng.2024.109772","DOIUrl":"10.1016/j.compeleceng.2024.109772","url":null,"abstract":"","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109772"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steering authority allocation strategy for human-machine shared control based on driver take-over feasibility","authors":"Chengrui Su , Haohan Yang , Jie Li , Xiaodong Wu","doi":"10.1016/j.compeleceng.2024.109753","DOIUrl":"10.1016/j.compeleceng.2024.109753","url":null,"abstract":"<div><div>Misoperation when a driver is distracted, e.g., turning the steering wheel unconsciously, preventing the machine from turning the steering wheel, etc., can lead to a false take-over of the vehicle, which poses a danger to shared control. Therefore, it is essential to evaluate the feasibility of driver take-over in distraction status. This paper proposes a steering authority allocation strategy based on driver take-over feasibility to reduce the interference of distracted driver behavior on shared control. First, a driver take-over feasibility framework is established based on quantified driver distraction levels and take-over intention. Then the shared control system is established based on a linear parameter-varying vehicle model and non-cooperative game theory to suppress the interference of time-varying speed and parameter uncertainty on shared control. Subsequently, the steering authority allocation strategy is constructed in conjunction with driver take-over feasibility and environmental risk evaluation. The proposed sigmoid-based mapping function ensures fast and smooth authority allocation. Finally, a series of driver-in-the-loop experiments are conducted to validate the effectiveness of our proposed strategy across various driving scenarios, and the results demonstrate that our strategy has superior performance than other advanced shared control schemes in reducing steering burden, improving driving safety, and enhancing vehicle stability, etc.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109753"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Majid Ali , Mujtaba Ahmad , Mohsin Ali Koondhar , Muhammad Sarfraz Akram , Aanchal Verma , Baseem Khan
{"title":"Corrigendum to “Maximum power point tracking for grid-connected photovoltaic system using Adaptive Fuzzy Logic Controller” [Computers and Electrical Engineering, Volume 110, September 2023, 108879]","authors":"Majid Ali , Mujtaba Ahmad , Mohsin Ali Koondhar , Muhammad Sarfraz Akram , Aanchal Verma , Baseem Khan","doi":"10.1016/j.compeleceng.2024.109773","DOIUrl":"10.1016/j.compeleceng.2024.109773","url":null,"abstract":"","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109773"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Landscape of learning techniques for intrusion detection system in IoT: A systematic literature review","authors":"Amina Khacha , Zibouda Aliouat , Yasmine Harbi , Chirihane Gherbi , Rafika Saadouni , Saad Harous","doi":"10.1016/j.compeleceng.2024.109725","DOIUrl":"10.1016/j.compeleceng.2024.109725","url":null,"abstract":"<div><div>The IoT has interconnected devices that collaborate via the Internet. Yet, its widespread connectivity and data generation pose cybersecurity risks. Integrating robust intrusion detection systems (IDSs) into the architecture has become crucial. IDSs safeguard data, detect attacks, and ensure network security and privacy. Constructing anomaly-based intrusion detection systems using artificial intelligence methods, often termed learning techniques, has gained significant traction lately. In this context, this study undertakes a systematic literature review to comprehensively analyze the current landscape of research concerning IoT security, explicitly employing learning techniques. These techniques fall under four primary categories: machine learning, deep learning, transfer learning, and federated learning. From a pool of 646 papers published between 2018 and 2023, we have selected 36 papers encompassing all these techniques based on the keywords of the study. These chosen studies were then categorized based on their respective learning techniques, with an additional hybrid classification that combines federated learning and transfer learning. Moreover, the paper provides a comparative analysis of the studied articles across different dimensions. The research outcomes demonstrate the effectiveness of each learning technique, shed light on the datasets and metrics employed, and conclude with a discussion on open challenges and future recommendations in this domain</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109725"},"PeriodicalIF":4.0,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142438379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial neural network based decentralized current-sharing control for parallel connected DC-DC converters in DC microgrid application","authors":"Musharraf Ali Saddriwala, Mohd Alam","doi":"10.1016/j.compeleceng.2024.109731","DOIUrl":"10.1016/j.compeleceng.2024.109731","url":null,"abstract":"<div><div>To create a non-interrupted, economical and reliable direct current (DC) microgrid, multiple DC-DC converters can be connected in parallel. Current sharing among these multiple converters becomes essential for proper operation of the system. This study proposes an artificial neural network (ANN) based control technique for parallel connected DC-DC boost converters which ensures accurate current sharing according to the specified maximum limits. Levenberg-Marquardt algorithm-based ANN network is used to reduce the training time and, also to achieve near ≈ 100 % accuracy of the training data. ANN control provides better voltage regulation, accurate current sharing unlike the conventional proportional-integral (PI) based control which faces issues such as inaccurate current sharing, high transient, peak overshoots and steady state error during sudden change in the system. The efficient functioning of the proposed control method is verified by simulating two parallel connected DC-DC converters using MATLAB/Simulink. A hardware prototype of converters rating ≈ 250 W using TMS320F28379D Digital signal processor controller is also developed to verify the performance and effectiveness of the ANN based control in comparison to PI based technique. The ANN based technique is faster to achieve the reference voltage, and the peak overshoot is approximately 75 % lesser than the PI based control.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"120 ","pages":"Article 109731"},"PeriodicalIF":4.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142437854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}