Current Issue : April-June Volume : 2024 Issue Number : 2 Articles : 5 Articles
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles (IoV), motivated by an unparalleled surge of connected vehicles on the roads. IoV has become an area of significant interest due to its potential in enhancing traffic safety as well as providing accurate routing information. The primary objective of IoV is to maintain strict latency standards while ensuring confidentiality and security. Given the high mobility and limited bandwidth, vehicles need to have rapid and frequent authentication. Securing Vehicle-to-Roadside unit (V2R) and Vehicle-to-Vehicle (V2V) communications in IoV is essential for preventing critical information leakage to an adversary or unauthenticated users. To address these challenges, this paper proposes a novel mutual authentication protocol which incorporates hardware-based security primitives, namely physically unclonable functions (PUFs) with Multi-Input Multi-Output (MIMO) physical layer communications. The protocol allows a V2V and V2R to mutually authenticate each other without the involvement of a trusted third-party (server). The protocol design effectively mitigates modeling attacks and impersonation attempts, where the accuracy of predicting the value of each PUF response bit does not exceed 54%, which is equivalent to a random guess....
Objective. Wireless sensor networks, crucial for various applications, face growing security challenges due to the escalating complexity and diversity of attack behaviours. This paper presents an advanced intrusion detection algorithm, leveraging feature-weighted Naive Bayes (NB), to enhance network attack detection accuracy. Methodology. Initially, a feature weighting algorithm is introduced to assign context-based weights to different feature terms. Subsequently, the NB algorithm is enhanced by incorporating Jensen–Shannon (JS) divergence, feature weighting, and inverse category frequency (ICF). Eventually, the improved NB algorithm is integrated into the intrusion detection model, and network event classification results are derived through a series of data processing steps applied to corresponding network traffic data. Results. The effectiveness of the proposed intrusion detection algorithm is evaluated through a comprehensive comparative analysis using the NSL-KDD dataset. Results demonstrate a significant enhancement in the detection accuracy of various attack types, including normal, denial of service (DoS), probe, remote-to-local (R2L), and user-to-root (U2R). Moreover, the proposed algorithm exhibits a lower false alarm rate compared to other algorithms. Conclusion. This paper introduces a wireless network intrusion algorithm that not only ensures improved detection accuracy and rate but also reduces the incidence of false detections. Addressing the evolving threat landscape faced by wireless sensor networks, this contribution represents a valuable advancement in intrusion detection technology....
At present, detection methods for rice microbial indicators are usually based on microbial culture or sensory detection methods, which are time-consuming or require expertise and thus cannot meet the needs of on-site rice testing when the rice is taken out of storage or traded. In order to develop a fast and non-destructive method for detecting rice mildew, in this paper, micro-computer vision technology is used to collect images of mildewed rice samples from 9 image locations. Then, a YOLO-V5 convolutional neural network model is used to detect moldy areas of rice, and the mold coverage area is estimated. The relationship between the moldy areas and the total number of bacterial colonies in the image is obtained. The results show that the precision and the recall of the established YOLO-v5 model in identifying the mildewed areas of rice in the validation set were 82.1% and 86.5%, respectively. Based on the mean mildewed area identified by the YOLO-v5 model, the precision and recall for light mold detection were 100% and 95.3%, respectively. The proposed method based on micro-computer vision and the YOLO convolutional neural network can be applied to the rapid detection of mildew in rice taken out of storage or traded....
In recent years, we need more bandwidth to enjoy entertainment contents such as video streaming, music and online gaming. To gain enough bandwidth, technologies that combine bandwidth by using multiple interfaces at same time are desired. Multipath transport protocols which combine multiple paths for packet delivery at the transport layer are a promising technology. Such protocols have a mechanism, called “packet scheduler”, to select the interface to send a packet. However, existing studies of the packet scheduler have not explicitly considered the compatibility of mobility with bonding of bandwidth. Therefore, when smartphone users move out of coverage of communication networks such as wireless Local Area Network (LAN) and Long Term Evolution (LTE) by vehicle, packet loss occurs, leading to a decrease of throughput. In this study, we propose a packet scheduler that selects an appropriate communication path so that packets can reach the peer before it moves out of the coverage. Based on routes of a vehicle and the position and communication range of the access point, the time at which a communication path will be lost is predicted. In addition, we employ MPQUIC (Multipath QUIC (Quick UDP Internet Connections)), which is a multipath transport protocol proposed as the extension of QUIC protocol, to reduce the ACK packet loss in multipath communication, and to reduce the time until the starts of retransmission. We evaluated the number of packet losses, the throughput and the time until starts of retransmission using a simulator and show the superiority of proposed method....
Background ‒ Computer networks are involved in many fields such as business, education, marketing, government, and tourism in several forms. Technologies related to security protection and improvement of information integrity are used and developed for computer networks intruded on by unauthorized people and help save their confidentiality. Methods ‒ To improve the risk identification of computer networks, this manuscript combined a fuzzy hierarchical reasoning model with the scientific inversion parallel programming method to study the risk of computer networks. Moreover, this article defined and analyzed a d-order neighborhood message propagation algorithm. A d-order neighborhood parallel message propagation algorithm using the Gaussian graph model was proposed. Results ‒ The risk of the computer network was analyzed using the proposed method resulting in better protection effectiveness. Conclusion ‒ The simulations showed that the proposed algorithm could effectively detect risks and improve the security of the computer network....
Loading....