Donglan Liu, Haotong Zhang, Rui Wang, Fang Zhang, Lili Sun, Xin Liu, L. Ma
{"title":"A lightweight IoT firmware vulnerability detection scheme based on homology detection","authors":"Donglan Liu, Haotong Zhang, Rui Wang, Fang Zhang, Lili Sun, Xin Liu, L. Ma","doi":"10.3233/jhs-222027","DOIUrl":"https://doi.org/10.3233/jhs-222027","url":null,"abstract":"In recent years, with the rapid development of IoT technology, hundreds of millions of IoT devices have been manufactured and applied, and the subsequent IoT attacks have become more and more severe. The complex and diverse architecture of IoT devices, coupled with the lack of security development specifications by IoT device manufacturers, and the widespread misuse and abuse of code, lead to the proliferation of IoT vulnerabilities. The conventional IoT vulnerability detection scheme is expensive to operate, and the implementation technology is complex, which is difficult to be fully promoted. This paper proposes a lightweight IoT firmware vulnerability detection scheme based on homology detection. The processing is converted into a feature vector, which effectively reduces the platform dependence. Combined with the database technology, the storage and retrieval efficiency is increased, and the same-origin vulnerability detection is realized by calculating the cosine similarity of the vector. The experimental results show that this scheme can effectively identify the vulnerabilities in firmware.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"48 1","pages":"287-297"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77284251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved energy-efficient routing architecture for traffic management system using a hybrid meta-heuristic algorithm in Internet of vehicles","authors":"Xiao-qiang Shao","doi":"10.3233/jhs-222003","DOIUrl":"https://doi.org/10.3233/jhs-222003","url":null,"abstract":"Today, Internet of Vehicles (IoV) applications communicate with smart devices and deploy Intelligent Transportation Systems (ITS) to recognize traffic congestion problems. One of the main challenges of smart cities and IoV platforms is data routing methods for smart traffic congestion problems to navigate the individual information of data transmission as a critical issue in the ITS. Providing a way to extend the Quality of Service (QoS) variables and energy efficiency methods for directing data transmission in routing-based traffic management systems within the IoV environment is an important issue since the energy consumption of IoV devices is a critical issue in low-power saving storage. This paper presents a hybrid Genetic Algorithm and Social Spider Optimization (GA-SSO) algorithm for an energy-aware routing schema for optimizing traffic congestion and smart devices in the IoV environment. After conducting some studies and comparisons, the exactness and prevalence of the proposed schema were received. Experimental results confirmed that the GA-SSO algorithm calculation decides optimal and ideal arrangement for energy-aware routing schema demonstrate by essentially making strides the execution of QoS variables can oversee information blockage comes from data transmission between IoV nodes.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"70 1","pages":"299-308"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74344629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual clustered redundancy assisted feature selection for an intrusion detection system","authors":"T. Veeranna, K. Reddi","doi":"10.3233/jhs-220694","DOIUrl":"https://doi.org/10.3233/jhs-220694","url":null,"abstract":"Intrusion Detection is very important in computer networks because the widespread of internet makes the computers more prone to several cyber-attacks. With this inspiration, a new paradigm called Intrusion Detection System (IDS) has emerged and attained a huge research interest. However, the major challenge in IDS is the presence of redundant and duplicate information that causes a serious computational problem in network traffic classifications. To solve this problem, in this paper, we propose a novel IDS model based on statistical processing techniques and machine learning algorithms. The machine learning algorithms incudes Fuzzy C-means and Support Vector Machine while the statistical processing techniques includes correlation and Joint Entropy. The main purpose of FCM is to cluster the train data and SVM is to classify the traffic connections. Next, the main purpose of correlation is to discover and remove the duplicate connections from every cluster while the Joint entropy is applied for the discovery and removal of duplicate features from every connection. For experimental validation, totally three standard datasets namely KDD Cup 99, NSL-KDD and Kyoto2006+ are considered and the performance is measured through Detection Rate, Precision, F-Score, and accuracy. A five-fold cross validation is done on every dataset by changing the traffic and the obtained average performance is compared with existing methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"504 1","pages":"257-273"},"PeriodicalIF":0.9,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83516387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, L. Barolli
{"title":"Implementation and evaluation of a fuzzy-based system for determining stress feeling level in VANETs: Effect of driving experience and history on driver stress","authors":"Kevin Bylykbashi, Ermioni Qafzezi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.3233/jhs-220693","DOIUrl":"https://doi.org/10.3233/jhs-220693","url":null,"abstract":"Drivers are held responsible for the vast majority of traffic accidents. While most of the errors that cause these accidents are involuntary, a significant number of them are caused by irresponsible driving behaviors, which must be utterly preventable. Irresponsible driving, in addition, is often associated with the stress drivers experience while driving. We have previously implemented an intelligent system based on fuzzy logic for determining driver’s stress in Vehicular Ad hoc Networks (VANETs), called Fuzzy-based System for Determining the Stress Feeling Level (FSDSFL), considering the driver’s impatience, the behavior of other drivers, and the traffic condition as input parameters. In this work, we present an Improved FSDSFL (IFSDSFL) system, which considers the driving experience and history as an additional input. We show through simulations the effect that driving experience and history and the other parameters have on the determination of the stress feeling level and demonstrate some actions that can be performed when the stress exceeds certain levels.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"243-255"},"PeriodicalIF":0.9,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76843698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Chi, Lei Li, Sang Gui, Fei Wang, Zijian Mao, Xiaohan Sun, Ning Cao
{"title":"Design of ultra-long-distance optical transport networks based on high-order remotely pumped amplifier","authors":"R. Chi, Lei Li, Sang Gui, Fei Wang, Zijian Mao, Xiaohan Sun, Ning Cao","doi":"10.3233/jhs-220688","DOIUrl":"https://doi.org/10.3233/jhs-220688","url":null,"abstract":"In order to further increase the span length of the Optical Transport Network (OTN) transmission system, a combination of Raman amplifier and remotely optical pumped amplifier (ROPA) configuration scheme is recommended. Optimal EDF length, optimal ROPA position and OTN span limitation are obtained through simulations. A field-trial with 8*10 Gb/s in 380 km span system is carried out with the amplifier configuration of Raman amplifier plus first-order and second-order remotely pumped amplifier. By adding a second-order remote pump laser, the transmission limit is increased from 77.5 dB to 80.7 dB. Through detailed analysis of the system, it is concluded that the second-order remote pump can effectively transfer the pump power to the first-order remote pump wavelength, which greatly increases the pump power at the gain module, thereby increasing the gain of the RGU and reduce its noise. Moreover, the introduction of the second-order remote pump effectively weakened the self-excited effect and overcomes the shortcomings of the low pump power threshold of the first-order remote pump.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"125 1","pages":"157-165"},"PeriodicalIF":0.9,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78465500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An energy-efficient quorum-based locking protocol by omitting meaningless methods on object replicas","authors":"T. Enokido, Dilawaer Duolikun, M. Takizawa","doi":"10.3233/jhs-220690","DOIUrl":"https://doi.org/10.3233/jhs-220690","url":null,"abstract":"In current information systems, a huge number of IoT (Internet of Things) devices are interconnected with various kinds of networks like WiFi and 5G networks. A large volume of data is gathered into servers from a huge number of IoT devices and is manipulated to provide application services. Gathered data is encapsulated along with methods to manipulate the data as an object like a database system. In object-based systems, each application is composed of multiple objects. In addition, each object is replicated on multiple physical servers in order to increase availability, reliability, and performance of an application service. On the other hand, replicas of each object is required to be mutually consistent in presence of multiple transactions. Here, a larger amount of electric energy and computation resources are consumed in physical servers than non-replication approaches to serialize conflicting transactions on multiple replicas. Many algorithms to synchronize conflicting transactions are so far proposed like 2PL (Two-Phase Locking) and TO (Timestamp Ordering). However, the electric energy consumption is not considered. In this paper, an EEQBL-OMM (Energy-Efficient Quorum-Based Locking with Omitting Meaningless Method) protocol is newly proposed to reduce not only the average execution time of each transaction but also the total electric energy consumption of servers by omitting the execution of meaningless methods on replicas of each object. Evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 79%, 62%, and 80% of the ECLBQS (Energy Consumption Laxity-Based Quorum Selection) protocol which is proposed in our previous studies in a homogeneous set of servers, respectively. In addition, the evaluation results show the total electric energy consumption of servers, the average execution time of each transaction, and the number of aborted instances of transactions in the EEQBL-OMM protocol can be on average reduced to 73%, 50%, and 67% of the ECLBQS protocol in a heterogeneous set of servers, respectively. The evaluation results also show at most 48% and 51% of the total number of methods can be omitted as meaningless methods in a homogeneous set and heterogeneous set of servers, respectively, in the EEQBL-OMM protocol.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"60 1","pages":"181-203"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84873070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-layer greedy forwarding algorithm for VANET","authors":"Yassine Hammouche, S. Merniz","doi":"10.3233/jhs-220689","DOIUrl":"https://doi.org/10.3233/jhs-220689","url":null,"abstract":"In recent years, vehicular communication systems have taken an important place in Intelligent Transport Systems (ITS). These systems are designed on self-organizing networks, known as Vehicular Ad hoc NETworks (VANETs). Their objective is to struggle against road safety problems and road traffic congestion by integrating information and communication technologies in road infrastructures and vehicles. VANET differs from other types of ad hoc networks by high mobility and very dynamic topology. Consequently, the design of an efficient VANET routing protocol becomes a challenging task. Many routing schemes with QoS (Quality of Service) have been proposed in the literature for VANET, to satisfy the performances required by the different applications running upon such networks. Cross-layer designs, which make it possible to exchange and share information between the different layers of the network, have shown to be efficient in VANETs. This paper proposes an improved version of the geographic Greedy algorithm as a cross-layer routing protocol for VANETs. The cooperation between the network layer and the lower layers involves three cyber-physical parameters: Speed, position and Signal-to-Noise Ratio (SNR). The simulation results over the Network Simulator-3 (NS3) demonstrated the effectiveness of the proposed solution in terms of end-to-end delay, throughput and packet delivery ratio.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"30 1","pages":"167-179"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76359455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing resource allocation scheme based on edge computing under augmented reality application","authors":"Yuxia Yuan, Zengyong Xu","doi":"10.3233/jhs-220687","DOIUrl":"https://doi.org/10.3233/jhs-220687","url":null,"abstract":"Edge computing can place computing, storage, bandwidth, application and other resources on the edge of the network to reduce transmission delay, and bandwidth limitation for users. Therefore, task scheduling and resource allocation in edge computing have become a new research focus. In view of the dynamic nature of computing resources in edge computing and the computing power limitation of a single computing resource, this paper proposes a computing resource allocation scheme based on edge computing under augmented reality (AR) application. On the premise of ensuring the completion time of sub-tasks and the revenue of computing service devices, the method transforms the computing resource allocation problem in edge computing into the many-to-many matching problem between sub-tasks and computing service devices. The performance of the proposed scheme is analyzed through experiments, and the results show that the resource allocation time is relatively stable, and it is better than other state-of-the-art algorithms in terms of the edge calculation, task delay, and task violation rate.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"10 1","pages":"143-156"},"PeriodicalIF":0.9,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88125665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection model based on coordinative immune and random antibody forest","authors":"Ling Zhang, Jian-Wei Zhang, X. Xin, Kai-Lai Zhou","doi":"10.3233/jhs-220691","DOIUrl":"https://doi.org/10.3233/jhs-220691","url":null,"abstract":"This study aimed to deal with the problems that current intrusion detections have poor classification ability toward small sets of samples. A new intrusion detection model based on coordinative immune and random antibody forest (CIRAFID) is proposed. The vaccination mechanism of coordinative immune algorithm is designed to increase the fitness of poor antibodies, a kind of random antibody detection forest model is given to detect anomalies, and to classify attacks. The experimental results show: the proposed model has higher detection rate, classification accuracy, classification ability and lower false positives rate.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"4 1","pages":"205-220"},"PeriodicalIF":0.9,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84443424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial intelligence mechanisms for management of QoS-aware connectivity in Internet of vehicles","authors":"Alireza Souri","doi":"10.3233/jhs-220692","DOIUrl":"https://doi.org/10.3233/jhs-220692","url":null,"abstract":"Today, Internet of Things (IoT) has provided intelligent interactions between sensors, smart devices, actuators, and cloud-based applications to ease human life. Currently, IoT-based connectivity management systems use computer-assisted learning methods to increase learning level and better understanding of the curriculums for students in universities, schools and research centers. On the other hand, virtual connectivity management systems are applied to facilitate teaching and learning methods under taken of pandemic effects. Because, data mining methods have important effect to enhancement and navigate IoT-based connectivity management systems, this paper presents a technical analysis on Artificial Intelligence (AI) approaches for connectivity management systems in IoT environments. This paper provides a comprehensive perspective on vehicular communication systems, Internet of Vehicles (IoV) methods and Vehicular Ad Hoc Network (VANET) environments that have evaluated using machine learning, fuzzy logic and intelligent algorithms. Also, applied evaluation metrics to predict and detect efficient connectivity methods, succeed learning models and enhancement of IoT-based connectivity management systems are discussed and analyzed for existing AI approaches. Finally, new research directions and emerging challenges are outlined to improve the performance of advanced IoT-based connectivity management systems.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"40 1","pages":"221-230"},"PeriodicalIF":0.9,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85310318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}