Search results
1 – 10 of 18Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…
Abstract
Purpose
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.
Design/methodology/approach
The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.
Findings
The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.
Originality/value
According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.
Details
Keywords
C. Bharanidharan, S. Malathi and Hariprasath Manoharan
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…
Abstract
Purpose
The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.
Design/methodology/approach
The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.
Findings
Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.
Originality/value
All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.
Details
Keywords
Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
Minning Wu, Feng Zhang and X. Rui
Internet of things (IoT) is essential in technical, social and economic domains, but there are many challenges that researchers are continuously trying to solve. Traditional…
Abstract
Purpose
Internet of things (IoT) is essential in technical, social and economic domains, but there are many challenges that researchers are continuously trying to solve. Traditional resource allocation methods in IoT focused on the optimal resource selection process, but the energy consumption for allocating resources is not considered sufficiently. This paper aims to propose a resource allocation technique aiming at energy and delay reduction in resource allocation. Because of the non-deterministic polynomial-time hard nature of the resource allocation issue and the forest optimization algorithm’s success in complex problems, the authors used this algorithm to allocate resources in IoT.
Design/methodology/approach
For the vast majority of IoT applications, energy-efficient communications, sustainable energy supply and reduction of latency have been major goals in resource allocation, making operating systems and applications more efficient. One of the most critical challenges in this field is efficient resource allocation. This paper has provided a new technique to solve the mentioned problem using the forest optimization algorithm. To simulate and analyze the proposed technique, the MATLAB software environment has been used. The results obtained from implementing the proposed method have been compared to the particle swarm optimization (PSO), genetic algorithm (GA) and distance-based algorithm.
Findings
Simulation results show that the proper performance of the proposed technique. The proposed method, in terms of “energy” and “delay,” is better than other ones (GA, PSO and distance-based algorithm).
Practical implications
The paper presents a useful method for improving resource allocation methods. The proposed method has higher efficiency compared to the previous methods. The MATLAB-based simulation results have indicated that energy consumption and delay have been improved compared to other algorithms, which causes the high application of this method in practical projects. In the future, the focus will be on resource failure and reducing the service level agreement violation rate concerning the number of resources.
Originality/value
The proposed technique can solve the mentioned problem in the IoT with the best resource utilization, low delay and reduced energy consumption. The proposed forest optimization-based algorithm is a promising technique to help enterprises participate in IoT initiatives and develop their business.
Details
Keywords
Mingyue Xie, Jun Liu, Shuyu Chen and Mingwei Lin
As the core technology of blockchain, various consensus mechanisms have emerged to satisfy the demands of different application scenarios. Since determining the security…
Abstract
Purpose
As the core technology of blockchain, various consensus mechanisms have emerged to satisfy the demands of different application scenarios. Since determining the security, scalability and other related performance of the blockchain, how to reach consensus efficiently of consensus mechanism is a critical issue in the blockchain.
Design/methodology/approach
The paper opted for a research overview on the blockchain consensus mechanism, including the consensus mechanisms' consensus progress, classification and comparison, which are complemented by documentary analysis.
Findings
This survey analyzes solutions for the improvement of consensus mechanisms in blockchain that have been proposed during the last few years and suggests future research directions around consensus mechanisms. First, the authors outline the consensus processes, the advantages and disadvantages of the mainstream consensus mechanisms. Additionally, the consensus mechanisms are subdivided into four types according to their characteristics. Then, the consensus mechanisms are compared and analyzed based on four evaluation criteria. Finally, the authors summarize the representative progress of consensus mechanisms and provide some suggestions on the design of consensus mechanisms to make further advances in this field.
Originality/value
This paper summarizes the future research development of the consensus mechanisms.
Details
Keywords
The purpose of this chapter is to examine the budgeting process in a local church from a social capital perspective. The social capital provides novel insights into the…
Abstract
The purpose of this chapter is to examine the budgeting process in a local church from a social capital perspective. The social capital provides novel insights into the construction of budgets and its social aspects. A qualitative case study was adopted, with an interpretive methodology. Semi-structured interviews were used to interview 14 managers involved in the budgeting process at a local independent church. The interview data were supplemented by documentary evidence. Nahapiet and Ghoshal (1998) framework of social capital was used to analyse the data. The main finding was that budgeting was found to be a social process – that can best be explained by social capital theory. There may be an element of self-selection, as the church agreed to participate in the study and chose to allow a researcher to examine social aspects of its budgeting process. The chapter contributes to both social capital theory and church literature. Social capital provides novel insights into the construction of budgets and its social aspects. In addition, contemporary budgeting practices are studied in a church in a denomination and country not previously studied.
Details
Keywords
Chien-Wen Shen and Phung Phi Tran
This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…
Abstract
Purpose
This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.
Design/methodology/approach
To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.
Findings
The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.
Research limitations/implications
Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.
Originality/value
This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.
Details
Keywords
The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…
Abstract
Purpose
The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.
Design/methodology/approach
The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.
Findings
The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.
Originality/value
The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.
Details
Keywords
Abderahman Rejeb, Karim Rejeb, Andrea Appolloni and Stefan Seuring
The literature on public procurement (PP) has increased significantly in recent years, and, to date, several reviews have been conducted to study this relevant subject…
Abstract
Purpose
The literature on public procurement (PP) has increased significantly in recent years, and, to date, several reviews have been conducted to study this relevant subject. Nevertheless, a bibliometric analysis of the PP knowledge domain is still missing. To fill this knowledge gap, a bibliometric review is carried out to investigate the current state of PP research.
Design/methodology/approach
A total of 640 journal articles are selected from the Scopus database for the final analysis. The performance indicators of the literature are identified and explained through bibliometric analysis. Furthermore, the conceptual and intellectual structures are studied through a keyword co-occurrence network and bibliographic coupling.
Findings
The results of the review indicate that PP research has increased significantly in recent years. The top ten most productive journals, countries, authors and academic institutions are identified. The findings from the keyword co-occurrence network reveal six main research themes including innovation, corruption and green public procurement (GPP). By applying bibliographic coupling, the focus of PP research revolves around seven thematic areas: GPP, corruption, the role of small and medium-sized enterprises (SMEs) in PP, electronic PP, innovation, labour standards and service acquisition. The research potential of each thematic area is evaluated using a model based on maturity and recent attention (RA).
Originality/value
To the best of the authors' knowledge, this is the first study to successfully organise, synthesise and quantitatively analyse the development of the PP domain amongst a large number of publications on a large time scale.
Details