Search results

1 – 3 of 3
Article
Publication date: 19 May 2021

Mithun B. Patil and Rekha Patil

Vertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do not…

Abstract

Purpose

Vertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do not provide support in generic mobility, but the vertical handover management providing in the heterogeneous wireless networks (HWNs) is crucial and challenging. Hence, this paper introduces the vertical handoff management approach based on an effective network selection scheme.

Design/methodology/approach

This paper aims to improve the working principle of previous methods and make VHO more efficient and reliable for the HWN.Initially, the handover triggering techniques is modelled for identifying an appropriate place to initiate handover based on the computed coverage area of cellular base station or wireless local area network (WLAN) access point. Then, inappropriate networks are eliminated for determining the better network to perform handover. Accordingly, a network selection approach is introduced on the basis ofthe Fractional-dolphin echolocation-based support vector neural network (Fractional-DE-based SVNN). The Fractional-DE is designed by integrating Fractional calculus (FC) in Dolphin echolocation (DE), and thereby, modifying the update rule of the DE algorithm based on the location of the solutions in past iterations. The proposed Fractional-DE algorithm is used to train Support vector neural network (SVNN) for selecting the best weights. Several parameters, like Bit error rate (BER), End to end delay (EED), jitter, packet loss, and energy consumption are considered for choosing the best network.

Findings

The performance of the proposed VHO mechanism based on Fractional-DE is evaluated based on delay, energy consumption, staytime, and throughput. The proposed Fractional-DE method achieves the minimal delay of 0.0100 sec, the minimal energy consumption of 0.348, maximal staytime of 4.373 sec, and the maximal throughput of 109.20 kbps.

Originality/value

In this paper, a network selection approach is introduced on the basis of the Fractional-Dolphin Echolocation-based Support vector neural network (Fractional-DE-based SVNN). The Fractional-DE is designed by integrating Fractional calculus (FC) in Dolphin echolocation (DE), and thereby, modifying the update rule of the DE algorithm based on the location of the solutions in past iterations. The proposed Fractional-DE algorithm is used to train SVNN for selecting the best weights. Several parameters, like Bit error rate (BER), End to end delay (EED), jitter, packet loss, and energy consumption are considered for choosing the best network.The performance of the proposed VHO mechanism based on Fractional-DE is evaluated based on delay, energy consumption, staytime, and throughput, in which the proposed method offers the best performance.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 3 June 2021

Mohandas V. Pawar and Anuradha J.

This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here…

Abstract

Purpose

This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here, different phases are included such as assigning the nodes, data collection, detecting black hole and wormhole attacks and preventing black hole and wormhole attacks by optimal path communication. Initially, a set of nodes is assumed for carrying out the communication in WSN. Further, the black hole attacks are detected by the Bait process, and wormhole attacks are detected by the round trip time (RTT) validation process. The data collection procedure is done with the Bait and RTT validation process with attribute information. The gathered data attributes are given for the training in which long short-term memory (LSTM) is used that includes the attack details. This is used for attack detection process. Once they are detected, those attacks are removed from the network using the optimal path selection process. Here, the optimal shortest path is determined by the improvement in the whale optimization algorithm (WOA) that is called as fitness rate-based whale optimization algorithm (FR-WOA). This shortest path communication is carried out based on the multi-objective function using energy, distance, delay and packet delivery ratio as constraints.

Design/methodology/approach

This paper implements a detection and prevention of attacks model based on FR-WOA algorithm for the prevention of attacks in the WSNs. With this, this paper aims to accomplish the desired optimization of multi-objective functions.

Findings

From the analysis, it is found that the accuracy of the optimized LSTM is better than conventional LSTM. The energy consumption of the proposed FR-WOA with 35 nodes is 7.14% superior to WOA and FireFly, 5.7% superior to grey wolf optimization and 10.3% superior to particle swarm optimization.

Originality/value

This paper develops the FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN. To the best of the authors’ knowledge, this is the first work that uses FR-WOA with optimized LSTM detecting and preventing black hole and wormhole attacks from WSN.

Article
Publication date: 16 June 2023

Haitham Nobanee, Ahmad Yuosef Alodat, Mehroz Nida Dilshad, Alaa El Sayah, Sondos Nezam Alas’ad, Baraa Omar Al Shalabi, Sara Fadel Alsadi, Noora Mohammed Al Marri and Farzin Kamal Fiza

This study aims to examine the research output on cyber insurance from 2002 to 2021 through an extensive bibliometric analysis. It examines the cyber insurance resources and how…

Abstract

Purpose

This study aims to examine the research output on cyber insurance from 2002 to 2021 through an extensive bibliometric analysis. It examines the cyber insurance resources and how the process of cyber insurance works.

Design/methodology/approach

This paper uses Scopus and VOSviewer to analyze cyber insurance papers. Using 503 papers from Scopus, this paper enhances the understanding of cyber insurance through collaborative network maps of experts and researchers.

Findings

The study comprehensively evaluates the development of cyber research. The results show that the number of research articles on cyber insurance has significantly increased since 2009.

Practical implications

The study's results offer practical implications for researchers to gain knowledge on the latest trends and developments in the domain. In addition, the study highlights the significance of cyber insurance in mitigating financial risks linked to cyberattacks, potentially boosting the investment of more organizations in such policies. Furthermore, practitioners can enhance their understanding of the various types of cyber insurance policies and their coverage.

Originality/value

Our results are likely to encourage practitioners, computer scientists, auditors, accountants and lawyers to contribute further to corporate strategies, data analytics and business operations to mitigate cyber risk consequences. In addition, understanding regarding the cyber insurance concept formed between experts and researchers is limited. This paper fills this gap by evaluating and identifying the development of cyber insurance literature.

Details

Global Knowledge, Memory and Communication, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9342

Keywords

1 – 3 of 3