Search results

1 – 10 of 18
Article
Publication date: 3 July 2023

Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…

Abstract

Purpose

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.

Design/methodology/approach

The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.

Findings

The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.

Originality/value

According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 September 2021

Minning Wu, Feng Zhang and X. Rui

Internet of things (IoT) is essential in technical, social and economic domains, but there are many challenges that researchers are continuously trying to solve. Traditional…

Abstract

Purpose

Internet of things (IoT) is essential in technical, social and economic domains, but there are many challenges that researchers are continuously trying to solve. Traditional resource allocation methods in IoT focused on the optimal resource selection process, but the energy consumption for allocating resources is not considered sufficiently. This paper aims to propose a resource allocation technique aiming at energy and delay reduction in resource allocation. Because of the non-deterministic polynomial-time hard nature of the resource allocation issue and the forest optimization algorithm’s success in complex problems, the authors used this algorithm to allocate resources in IoT.

Design/methodology/approach

For the vast majority of IoT applications, energy-efficient communications, sustainable energy supply and reduction of latency have been major goals in resource allocation, making operating systems and applications more efficient. One of the most critical challenges in this field is efficient resource allocation. This paper has provided a new technique to solve the mentioned problem using the forest optimization algorithm. To simulate and analyze the proposed technique, the MATLAB software environment has been used. The results obtained from implementing the proposed method have been compared to the particle swarm optimization (PSO), genetic algorithm (GA) and distance-based algorithm.

Findings

Simulation results show that the proper performance of the proposed technique. The proposed method, in terms of “energy” and “delay,” is better than other ones (GA, PSO and distance-based algorithm).

Practical implications

The paper presents a useful method for improving resource allocation methods. The proposed method has higher efficiency compared to the previous methods. The MATLAB-based simulation results have indicated that energy consumption and delay have been improved compared to other algorithms, which causes the high application of this method in practical projects. In the future, the focus will be on resource failure and reducing the service level agreement violation rate concerning the number of resources.

Originality/value

The proposed technique can solve the mentioned problem in the IoT with the best resource utilization, low delay and reduced energy consumption. The proposed forest optimization-based algorithm is a promising technique to help enterprises participate in IoT initiatives and develop their business.

Details

Circuit World, vol. 49 no. 3
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 27 September 2022

Mingyue Xie, Jun Liu, Shuyu Chen and Mingwei Lin

As the core technology of blockchain, various consensus mechanisms have emerged to satisfy the demands of different application scenarios. Since determining the security…

1012

Abstract

Purpose

As the core technology of blockchain, various consensus mechanisms have emerged to satisfy the demands of different application scenarios. Since determining the security, scalability and other related performance of the blockchain, how to reach consensus efficiently of consensus mechanism is a critical issue in the blockchain.

Design/methodology/approach

The paper opted for a research overview on the blockchain consensus mechanism, including the consensus mechanisms' consensus progress, classification and comparison, which are complemented by documentary analysis.

Findings

This survey analyzes solutions for the improvement of consensus mechanisms in blockchain that have been proposed during the last few years and suggests future research directions around consensus mechanisms. First, the authors outline the consensus processes, the advantages and disadvantages of the mainstream consensus mechanisms. Additionally, the consensus mechanisms are subdivided into four types according to their characteristics. Then, the consensus mechanisms are compared and analyzed based on four evaluation criteria. Finally, the authors summarize the representative progress of consensus mechanisms and provide some suggestions on the design of consensus mechanisms to make further advances in this field.

Originality/value

This paper summarizes the future research development of the consensus mechanisms.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 16 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Abstract

Details

Sameness and Repetition in Contemporary Media Culture
Type: Book
ISBN: 978-1-80455-955-0

Book part
Publication date: 24 October 2023

Umesh Sharma and Denise Frost

The purpose of this chapter is to examine the budgeting process in a local church from a social capital perspective. The social capital provides novel insights into the…

Abstract

The purpose of this chapter is to examine the budgeting process in a local church from a social capital perspective. The social capital provides novel insights into the construction of budgets and its social aspects. A qualitative case study was adopted, with an interpretive methodology. Semi-structured interviews were used to interview 14 managers involved in the budgeting process at a local independent church. The interview data were supplemented by documentary evidence. Nahapiet and Ghoshal (1998) framework of social capital was used to analyse the data. The main finding was that budgeting was found to be a social process – that can best be explained by social capital theory. There may be an element of self-selection, as the church agreed to participate in the study and chose to allow a researcher to examine social aspects of its budgeting process. The chapter contributes to both social capital theory and church literature. Social capital provides novel insights into the construction of budgets and its social aspects. In addition, contemporary budgeting practices are studied in a church in a denomination and country not previously studied.

Details

Advances in Management Accounting
Type: Book
ISBN: 978-1-83753-917-8

Keywords

Article
Publication date: 16 October 2023

Chien-Wen Shen and Phung Phi Tran

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news…

Abstract

Purpose

This study aims to provide a more complete picture of blockchain development by combining numerous methodologies with diverse data sources, such as academic papers and news articles. This study displays the developmental status of each subject based on the interrelationships of each topic cluster by analyzing high-frequency keywords extracted from the collected data. Moreover, applying above methodologies will help understanding top research topics, authors, venues, institutes and countries. The differences of blockchain research and new are identified.

Design/methodology/approach

To identify and find blockchain development linkages, researchers have used search terms such as co-occurrence, bibliographic coupling, co-citation and co-authorship to help us understand the top research topics, authors, venues, institutes and countries. This study also used text mining analysis to identify blockchain articles' primary concepts and semantic structures.

Findings

The findings show the fundamental topics based on each topic cluster's links. While “technology”, “transaction”, “privacy and security”, “environment” and “consensus” were most strongly associated with blockchain in research, “platform”, “big data and cloud”, “network”, “healthcare and business” and “authentication” were closely tied to blockchain news. This article classifies blockchain principles into five patterns: hardware and infrastructure, data, networking, applications and consensus. These statistics helped the authors comprehend the top research topics, authors, venues, publication institutes and countries.

Research limitations/implications

Since Web of Science (WoS) and LexisNexis Academic data are used, the study has few sources. Others advise merging foreign datasets. WoS is one of the world's largest and most-used databases for assessing scientific papers.

Originality/value

This study has several uses and benefits. First, key concept discoveries can help academics understand blockchain research trends so they can prioritize research initiatives. Second, bibliographic coupling links academic papers on blockchain. It helps information seekers search and classify the material. Co-citation analysis results can help researchers identify potential partners and leaders in their field. The network's key organizations or countries should be proactive in discovering, proposing and creating new relationships with other organizations or countries, especially those from the journal network's border, to make the overall network more integrated and linked. Prominent members help recruit new authors to organizations or countries and link them to the co-authorship network. This study also used concept-linking analysis to identify blockchain articles' primary concepts and semantic structures. This may lead to new authors developing research ideas or subjects in primary disciplines of inquiry.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 21 July 2023

Serap Ergün

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption…

Abstract

Purpose

The purpose of this study is to propose a decentralized multi-party cross-trading scheme based on a certificate transaction mechanism for the transaction of excess consumption certificates (ECCs) of renewable energy. The aim is to address the problems associated with the existing centralized transaction mode and to promote the development of the green electricity industry.

Design/methodology/approach

The proposed scheme involves calculating the quotation difference for the same type of certificate transaction based on the quotations of all users of both buyers and sellers. The transaction volume is then determined based on the order of quotation difference from large to small, and the total interests of cooperation are calculated. The nucleolus method is adopted to allocate the total interests to each member of the alliance and calculate the final transaction price. The blockchain technology is used for the transaction to achieve accurate traceability and efficient supervision, and a corresponding smart contract is designed and simulated in the Ethereum consortium chain.

Findings

The results of the simulation show the rationality and effectiveness of the proposed scheme. The decentralized multi-party cross-trading scheme can overcome the problems associated with the existing centralized transaction mode, such as low transaction efficiency, difficulty in obtaining the optimal transaction strategy and efficient supervision. The proposed scheme can promote the development of the green electricity industry by stimulating users' demand potential for green electricity.

Originality/value

The proposed scheme is original in its use of a certificate transaction mechanism to facilitate the trading of ECCs of renewable energy. The scheme adopts a decentralized multi-party cross-trading approach that overcomes the problems associated with the existing centralized transaction mode. The use of the nucleolus method for the allocation of total interests to each member of the alliance is also original. Finally, the use of blockchain technology for accurate traceability and efficient supervision of the transaction is an original contribution to the field.

Open Access
Article
Publication date: 3 January 2024

Abderahman Rejeb, Karim Rejeb, Andrea Appolloni and Stefan Seuring

The literature on public procurement (PP) has increased significantly in recent years, and, to date, several reviews have been conducted to study this relevant subject…

2309

Abstract

Purpose

The literature on public procurement (PP) has increased significantly in recent years, and, to date, several reviews have been conducted to study this relevant subject. Nevertheless, a bibliometric analysis of the PP knowledge domain is still missing. To fill this knowledge gap, a bibliometric review is carried out to investigate the current state of PP research.

Design/methodology/approach

A total of 640 journal articles are selected from the Scopus database for the final analysis. The performance indicators of the literature are identified and explained through bibliometric analysis. Furthermore, the conceptual and intellectual structures are studied through a keyword co-occurrence network and bibliographic coupling.

Findings

The results of the review indicate that PP research has increased significantly in recent years. The top ten most productive journals, countries, authors and academic institutions are identified. The findings from the keyword co-occurrence network reveal six main research themes including innovation, corruption and green public procurement (GPP). By applying bibliographic coupling, the focus of PP research revolves around seven thematic areas: GPP, corruption, the role of small and medium-sized enterprises (SMEs) in PP, electronic PP, innovation, labour standards and service acquisition. The research potential of each thematic area is evaluated using a model based on maturity and recent attention (RA).

Originality/value

To the best of the authors' knowledge, this is the first study to successfully organise, synthesise and quantitatively analyse the development of the PP domain amongst a large number of publications on a large time scale.

Details

International Journal of Public Sector Management, vol. 37 no. 2
Type: Research Article
ISSN: 0951-3558

Keywords

1 – 10 of 18