{"title":"Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks","authors":"Mintu Singh, Maheshwari Prasad Singh","doi":"10.1002/cpe.8191","DOIUrl":"https://doi.org/10.1002/cpe.8191","url":null,"abstract":"<div>\u0000 \u0000 <p>The wireless sensor network (WSN) has been assimilated into modern society and is utilized in many crucial application domains, including animal monitoring, border surveillance, asset monitoring, and so forth. These technologies aid in protecting the place of the event's occurrence from the adversary. Maintaining privacy concerning the source location is challenging due to the sensor nodes' limitations and efficient routing strategies. Hence, this research introduces a novel source location privacy preservation using the awareness-based Gannet with random-Dijkstra's algorithm (AGO-RD). The network is initialized by splitting the hotspot and non-hotspot region optimally using the proposed awareness-based Gannet (AGO) algorithm. Here, the multi-objective fitness function is utilized to initialize the network based on factors like throughput, energy consumption, latency, and entropy. Then, the information is forwarded to the phantom node in the non-hotspot region to preserve the source location's privacy, which is far from the sink node. The proposed random-Dijkstra algorithm is utilized to route the information from the phantom node to the sink with more security. Analysis of the proposed AGO-RD-based source location privacy preservation technique in terms of delay, throughput, network lifetime, and energy consumption accomplished the values of 6.52 ms, 95.68%, 7109.9 rounds, and 0.000125 μJ.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 21","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RETRACTION: Minimal Channel Cost-Based Energy-Efficient Resource Allocation Algorithm for Task Offloading Under Fog Computing Environment","authors":"","doi":"10.1002/cpe.8202","DOIUrl":"https://doi.org/10.1002/cpe.8202","url":null,"abstract":"<p><b>RETRACTION</b>: B. Premalatha and P. Prakasam, “Minimal Channel Cost-Based Energy-Efficient Resource Allocation Algorithm for Task Offloading Under Fog Computing Environment,” <i>Concurrency and Computation: Practice and Experience</i> 36, no. 7 (2024): e7968, \u0000https://doi.org/10.1002/cpe.7968.</p><p>The above article, published online on 27 November 2023 in Wiley Online Library (\u0000wileyonlinelibrary.com), has been retracted by agreement between the journal Editors-in-Chief, David W. Walker, Nitin Auluck, Jinjun Chen, Martin Berzins; and John Wiley and Sons Ltd. The retraction has been agreed upon following an investigation into concerns raised by a third party, which revealed major textual overlap, significant primary data redundancy and simultaneous submission with a previously published article by the same group of authors elsewhere. Such publishing practice is against the journal's policy and Wiley's Best Practice Guidelines on Research Integrity and Publishing Ethics. The authors were informed of the decision to retract but did not agree to the retraction or the wording.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 24","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/cpe.8202","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142404840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing UAV-HetNet security through functional encryption framework","authors":"Sachin Kumar Gupta, Parul Gupta, Pawan Singh","doi":"10.1002/cpe.8206","DOIUrl":"https://doi.org/10.1002/cpe.8206","url":null,"abstract":"<div>\u0000 \u0000 <p>In the current landscape, the rapid expansion of the internet has brought about a corresponding surge in the number of data consumers. As user volume and diversity have escalated, the shift from conventional, uniform networks to Heterogeneous Networks (HetNets) has emerged. HetNets are designed with a primary objective: enhancing Quality of Service (QoS) standards for users. In the context of HetNets facilitated by Unmanned Aerial Vehicles (UAVs), a substantial influx of users and devices is observed. Within this multifaceted environment, the potential for malicious intruder nodes to efficiently execute and propagate harmful actions across the network is a distinct concern. Consequently, the entirety of network communication becomes susceptible to a multitude of security threats. To address these vulnerabilities and safeguard communication, the Functional Encryption (FE) technique is employed. FE empowers the protection of data against intrusion attacks. This paper presents a comprehensive methodology for implementing FE within UAV-integrated HetNets, executed in two sequential phases. The initial phase secures communication between User Equipment (UE) and Micro Base Station (MBS), followed by the second phase, which focuses on securing communication among MBS and UAV. The viability of the proposed approach is substantiated through validation using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The validation process involves the development of High-Level Protocol Specification Language (HLPSL) codes. The successful security validation outcome underscores the capacity of the proposed methodology to provide the intended security measures and robustness to the network environment.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141967986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoran Zhao, Changgen Peng, Hongfa Ding, Weijie Tan
{"title":"An integrated graph data privacy attack framework based on graph neural networks in IoT","authors":"Xiaoran Zhao, Changgen Peng, Hongfa Ding, Weijie Tan","doi":"10.1002/cpe.8209","DOIUrl":"10.1002/cpe.8209","url":null,"abstract":"<div>\u0000 \u0000 <p>Knowledge graphs contain a large amount of entity and relational data, and graph neural networks, as a class of efficient graph representation techniques based on deep learning, excel in knowledge graph modeling. However, previous neural network architectures for the most part only learn node representations and do not fully consider the heterogeneity of data. In this article, we innovatively propose a privacy attack framework based on IoT, PAFI, which is able to classify entities and relations, learn embedding representations in multi-relational graphs, and can be applied to some existing neural network algorithms. Based on this, a fine-grained privacy attack model, FPM, is proposed, which can perform attack operations on multiple targets, achieve selectivity of target tasks, and greatly improve the generalization ability of the attack model. In this article, the effectiveness of PAFI and FPM is demonstrated by real network datasets, and compared with previous attack methods, both of which achieve good results.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141343551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DRL-based computing offloading approach for large-scale heterogeneous tasks in mobile edge computing","authors":"Bingkun He, Haokun Li, Tong Chen","doi":"10.1002/cpe.8156","DOIUrl":"10.1002/cpe.8156","url":null,"abstract":"<p>In the last few years, the rapid advancement of the Internet of Things (IoT) and the widespread adoption of smart cities have posed new challenges to computing services. Traditional cloud computing models fail to fulfil the rapid response requirement of latency-sensitive applications, while mobile edge computing (MEC) improves service efficiency and customer experience by transferring computing tasks to servers located at the network edge. However, designing an effective computing offloading strategy in complex scenarios involving multiple computing tasks, nodes, and services remains a pressing issue. In this paper, a computing offloading approach based on Deep Reinforcement Learning (DRL) is proposed for large-scale heterogeneous computing tasks. First, Markov Decision Processes (MDPs) is used to formulate computing offloading decision and resource allocation problems in large-scale heterogeneous MEC systems. Subsequently, a comprehensive framework comprising the \"end-edge-cloud\" along with the corresponding time-overhead and resource allocation models is constructed. Finally, through extensive experiments on real datasets, the proposed approach is demonstrated to outperform existing methods in enhancing service response speed, reducing latency, balancing server loads, and saving energy.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 19","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141350923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bo Ye, Feng Li, Linghao Zhang, Zhengwei Chang, Bin Wang, Xiaoyu Zhang, Sayina Bodanbai
{"title":"Fault diagnosis of power equipment based on variational autoencoder and semi-supervised learning","authors":"Bo Ye, Feng Li, Linghao Zhang, Zhengwei Chang, Bin Wang, Xiaoyu Zhang, Sayina Bodanbai","doi":"10.1002/cpe.8204","DOIUrl":"10.1002/cpe.8204","url":null,"abstract":"<div>\u0000 \u0000 <p>The issue of fault diagnosis in power equipment is receiving increasing attention from scholars. Due to the important role played by bearings in power equipment, bearing faults have become the main factor causing the shutdown of wind turbines units. Therefore, this paper takes bearing equipment as an example for research. In order to solve the problem of insufficient and unbalanced fault sample data of wind turbines bearings, a fault diagnosis (FD) method based on variational autoencoder and semi-supervised learning is proposed in this paper. Firstly, based on Label Propagation-random forests (LP-RFs) and a small number of labeled fault samples, a semi-supervised learning algorithm is proposed to label the original data samples. Secondly, a small number of training samples are preprocessed by the variational autoencoder to reduce the imbalance of the fault samples. Then, the RFs-based method is adopted to train the processed fault samples to obtain a mature FD classifier. Finally, the proposed method is applied to FD for bearings, and the results show that the proposed method can realize bearings fault diagnosis (BFD). And meanwhile, the proposed method can also be applied for fault diagnosis in power transmission and transformation systems.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141352115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QSKCG: Quantum-based secure key communication and key generation scheme for outsourced data in cloud","authors":"Vamshi Adouth, Eswari Rajagopal","doi":"10.1002/cpe.8192","DOIUrl":"10.1002/cpe.8192","url":null,"abstract":"<p>In the era of digital proliferation, individuals opt for cloud servers to store their data due to the diverse advantages they offer. However, entrusting data to cloud servers relinquishes users' control, potentially compromising data confidentiality and integrity. Traditional auditing methods designed to ensure data integrity in cloud servers typically depend on Trusted Third Party Auditors. Yet, many of these existing auditing approaches grapple with intricate certificate management and key escrow issues. Furthermore, the imminent threat of powerful quantum computers poses a risk of swiftly compromising these methods in polynomial time. To overcome these challenges, this paper introduces a Quantum-based Secure Key Communication and Key Generation Scheme QSKCG for Outsourced Data in the Cloud. Leveraging Elliptic Curve Cryptography, the BB84 secure communication protocol, certificateless signature, and blockchain network, the proposed scheme is demonstrated through security analysis, affirming its robustness and high efficiency. Additionally, performance analysis underscores the practicality of the proposed scheme in achieving post-quantum security in cloud storage.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141357273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayres Nishio, Milton B. Do Coutto Filho, Julio C. Stachinni de Souza, Esteban W. G. Clua
{"title":"GPU parallel processing to enable extensive criticality analysis in state estimation","authors":"Ayres Nishio, Milton B. Do Coutto Filho, Julio C. Stachinni de Souza, Esteban W. G. Clua","doi":"10.1002/cpe.8200","DOIUrl":"10.1002/cpe.8200","url":null,"abstract":"<div>\u0000 \u0000 <p>Power system monitoring relies on the reliability of state estimation (SE) results. SE plays a dominant role in data debugging if sufficient data is available. Criticality analysis (CA) integrates SE as a module in which measurements—taken one-by-one or in groups (tuples) of minimal cardinality—are designated crucial. The combinatorial nature of extensive CA (not restricted to identifying low-cardinality critical tuples) characterizes its computational complexity and imposes challenging limits to go beyond. In simple terms, these limits are established by the number of measurements to be combined, the cardinality of tuples, and the computing time required to check the criticality condition. This paper proposes an innovative computational solution to expand CA limits found to date in the literature. A framework with multi-threads designed cleverly on a graphics processing unit (GPU) parallel processing environment is built. The conceived architecture favors evaluating massive measurement combinations of diverse cardinality in extensive CA. Numerical results reveal significant speed-ups with the proposed approach, contrasting with those reported in research efforts published so far.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141360280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy logic-based computation offloading technique in fog computing","authors":"Dinesh Soni, Neetesh Kumar","doi":"10.1002/cpe.8198","DOIUrl":"10.1002/cpe.8198","url":null,"abstract":"<p>The fog computing environment expands the capabilities of cloud computing by moving computing, storage, and networking services closer to IoT devices. These resource-constrained IoT devices often face challenges like high task failure rates and extended execution latency due to data traffic congestion. Distributing IoT services through task offloading across different layers of computing paradigms enhances QoS (Quality of Service) parameters. This endeavor aims to allocate custom workflow-based real-time tasks or jobs for processing across various cloud/fog/edge layers, optimizing QoS factors like makespan, energy consumption, and cost. In the fog computing environment, challenges arise due to uncertainties related to job execution locations and the ability to predict future user requirements. Fuzzy logic offers low-complexity solutions for handling unpredictable and rapidly changing conditions. This paper proposes a hybrid fog-cloud-based computing architecture and an intelligent fuzzy logic-based computation offloading approach. This approach effectively allocates workloads among edge, fog, and cloud layers, resulting in improvements in makespan time (7.51%), energy consumption (4.63%), and cost (13.60%). The proposed method selects suitable processing units or compute nodes for job execution, utilizing heterogeneous resources. Simulation results demonstrate that the proposed methodology outperforms current state-of-the-art algorithms.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving ROUGE-1 by 6%: A novel multilingual transformer for abstractive news summarization","authors":"Sandeep Kumar, Arun Solanki","doi":"10.1002/cpe.8199","DOIUrl":"10.1002/cpe.8199","url":null,"abstract":"<div>\u0000 \u0000 <p>Natural language processing (NLP) has undergone a significant transformation, evolving from manually crafted rules to powerful deep learning techniques such as transformers. These advancements have revolutionized various domains including summarization, question answering, and more. Statistical models like hidden Markov models (HMMs) and supervised learning have played crucial roles in laying the foundation for this progress. Recent breakthroughs in transfer learning and the emergence of large-scale models like BERT and GPT have further pushed the boundaries of NLP research. However, news summarization remains a challenging task in NLP, often resulting in factual inaccuracies or the loss of the article's essence. In this study, we propose a novel approach to news summarization utilizing a fine-tuned Transformer architecture pre-trained on Google's mt-small tokenizer. Our model demonstrates significant performance improvements over previous methods on the Inshorts English News dataset, achieving a 6% enhancement in the ROUGE-1 score and reducing training loss by 50%. This breakthrough facilitates the generation of reliable and concise news summaries, thereby enhancing information accessibility and user experience. Additionally, we conduct a comprehensive evaluation of our model's performance using popular metrics such as ROUGE scores, with our proposed model achieving ROUGE-1: 54.6130, ROUGE-2: 31.1543, ROUGE-L: 50.7709, and ROUGE-LSum: 50.7907. Furthermore, we observe a substantial reduction in training and validation losses, underscoring the effectiveness of our proposed approach.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 20","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}