Search results

1 – 10 of over 2000
Article
Publication date: 17 May 2023

Ishita Seth, Kalpna Guleria and Surya Narayan Panda

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…

28

Abstract

Purpose

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.

Design/methodology/approach

The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.

Findings

The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.

Originality/value

The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.

Open Access
Article
Publication date: 27 December 2021

Hristo Trifonov and Donal Heffernan

The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable;…

3201

Abstract

Purpose

The purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not interoperable; thus, limiting the potential capabilities for the Industrial Internet of Things (IIoT). There is no forthcoming new generation fieldbus standard to integrate into the IIoT and Industry 4.0 revolution. The open platform communications unified architecture (OPC UA) time-sensitive networking (TSN) is a potential vendor-independent successor technology for the factory network. The OPC UA is a data exchange standard for industrial communication, and TSN is an Institute of Electrical and Electronics Engineers standard for Ethernet that supports real-time behaviour. The merging of these open standard solutions can facilitate cross-vendor interoperability for Industry 4.0 and IIoT products.

Design/methodology/approach

A brief review of the history of the fieldbus standards is presented, which highlights the shortcomings for current industrial systems in meeting converged traffic solutions. An experimental system for the OPC UA TSN is described to demonstrate an approach to developing a three-layer factory network system with an emphasis on the field layer.

Findings

From the multitude of existing industrial network schemes, there is a convergence pathway in solutions based on TSN Ethernet and OPC UA. At the field level, basic timing measurements in this paper show that the OPC UA TSN can meet the basic critical timing requirements for a fieldbus network.

Originality/value

This paper uniquely focuses on the specific fieldbus standards elements of industrial networks evolution and traces the developments from the early history to the current developing integration in IIoT context.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 3
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 11 September 2023

Kumar Saurabh, Parijat Upadhyay and Neelam Rani

Decentralised autonomous organisations (DAOs) are internet-native self-governing enterprises where individual groups, communities, agencies, consumers and providers work together…

Abstract

Purpose

Decentralised autonomous organisations (DAOs) are internet-native self-governing enterprises where individual groups, communities, agencies, consumers and providers work together using blockchain-led smart contracts (SCs). This study aims to examine the role of DAO marketplaces in technology-led autonomous organisation design for enterprise technology sourcing industries, with algorithmic trust and governance.

Design/methodology/approach

The authors examined the importance of an enterprise marketplace governance platform for technology sourcing using DAO as a decentralised/democratised business model. A total of 98 DAO products/services are evaluated across 11 industries that envisage DAO as a strategic choice for the governance of decentralised marketplace platforms.

Findings

The research findings validate how a DAO-led enterprise marketplace governance platform can create a cohesive collaboration between consumers (enterprises) and providers (solution vendors) in a disintermediated way. The proposed novel layered solution for an autonomous governance-led enterprise marketplace promises algorithmic trust-led, self-governed tactical alternatives to a strategic plan.

Research limitations/implications

The research targets multiple industry outlooks to understand decentralised autonomous marketplace governance and develop the theoretical foundation for research and extensive corporate suitability.

Practical implications

The research underpinnings boost the entrepreneurs’ ability to realise the practical potential of DAO between multiple parties using SCs and tokenise the entire product and service offerings over immutable ledger technologies.

Originality/value

To the best of the authors’ knowledge, this research is unique and the first of its kind to study the multi-industry role of algorithmic trust and governance in enterprise technology sourcing marketplaces driven by 98 decentralised and consensus-based DAO products across 11 industries.

Details

Digital Policy, Regulation and Governance, vol. 25 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Book part
Publication date: 13 December 2023

Somayya Madakam, Rajeev Kumar Revulagadda, Vinaytosh Mishra and Kaustav Kundu

One of the most hyped concepts in the manufacturing industry is ‘Industry 4.0’. The ‘Industry 4.0’ concept is grabbing the attention of every manufacturing industry across the…

Abstract

One of the most hyped concepts in the manufacturing industry is ‘Industry 4.0’. The ‘Industry 4.0’ concept is grabbing the attention of every manufacturing industry across the globe because of its immense applications. This phenomenon is an advanced version of Industry 3.0, combining manufacturing processes and the latest Internet of Things (IoT) technologies. The main advantage of this paradigm shift is efficiency and efficacy in the manufacturing process with the help of advanced automated technologies. The concept of ‘Industry 4.0’ is contemporary, so it falls under exploratory study. Therefore, the research methodology is thematic narration grounded on secondary data (online) analysis. In this light, this chapter aims to explain ‘Industry 4.0’ in terms of concepts, theories and models based on the Web of Science (WoS) database. The data include research manuscripts, book chapters, blogs, white papers, news items and proceedings. The study details the latest technologies behind the ‘Industry 4.0’ phenomenon, different business intelligence technologies and their practical implications in some manufacturing industries. This chapter mainly elaborates on Industry 4.0 frameworks designed by (1) PwC (2) IBM (3) Frost & Sullivan.

Details

Fostering Sustainable Development in the Age of Technologies
Type: Book
ISBN: 978-1-83753-060-1

Keywords

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Content available
Book part
Publication date: 31 July 2023

Michael Nizich

Abstract

Details

The Cybersecurity Workforce of Tomorrow
Type: Book
ISBN: 978-1-80382-918-0

Open Access
Article
Publication date: 14 February 2023

Lemma Lessa and Daniel Gebrehawariat

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an…

1143

Abstract

Purpose

This study is aimed at assessing the information security management practice with a focus on banking card security in selected financial institutions in Ethiopia, using an international information security standard as a benchmark. It is to identify the gaps and recommend best security practices to help financial institutions meet the required security compliance.

Design/methodology/approach

Two financial sectors were purposively selected. A total of twenty-five respondents (IT executives and IT staff) were included in the study. Quantitative data was collected using the PCI-DSS (Payment Card Industry Data Security Standard) security standard questionnaire. In addition, observation and document analysis were made.

Findings

The result shows that most of the essential security management activities in the financial sectors do not comply with the international security standard. Similarly, the level of most of the indispensable security requirements that should be in place is found to be below the acceptable level. The study also revealed major security factors that prohibit the financial sectors from PCI-DSS security standard compliance.

Originality/value

This study assessed the information security management practice with a focus on banking card security and tried to figure out the limitations of security practices of the organizations surveyed based on the standard adopted. The topic has not been well explored especially in the Ethiopia context. Hence, the result can positively influence security policies, particularly in the banking sector.

Details

International Journal of Industrial Engineering and Operations Management, vol. 5 no. 2
Type: Research Article
ISSN: 2690-6090

Keywords

Article
Publication date: 3 January 2024

Miao Ye, Lin Qiang Huang, Xiao Li Wang, Yong Wang, Qiu Xiang Jiang and Hong Bing Qiu

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Abstract

Purpose

A cross-domain intelligent software-defined network (SDN) routing method based on a proposed multiagent deep reinforcement learning (MDRL) method is developed.

Design/methodology/approach

First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between the root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to acquire global network state information in real time. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a network traffic state prediction mechanism is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time.

Findings

Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and open shortest path first (OSPF) routing methods.

Originality/value

Message transmission and message synchronization for multicontroller interdomain routing in SDN have long adaptation times and slow convergence speeds, coupled with the shortcomings of traditional interdomain routing methods, such as cumbersome configuration and inflexible acquisition of network state information. These drawbacks make it difficult to obtain global state information about the network, and the optimal routing decision cannot be made in real time, affecting network performance. This paper proposes a cross-domain intelligent SDN routing method based on a proposed MDRL method. First, the network is divided into multiple subdomains managed by multiple local controllers, and the state information of each subdomain is flexibly obtained by the designed SDN multithreaded network measurement mechanism. Then, a cooperative communication module is designed to realize message transmission and message synchronization between root and local controllers, and socket technology is used to ensure the reliability and stability of message transmission between multiple controllers to realize the real-time acquisition of global network state information. Finally, after the optimal intradomain and interdomain routing paths are adaptively generated by the agents in the root and local controllers, a prediction mechanism for the network traffic state is designed to improve awareness of the cross-domain intelligent routing method and enable the generation of the optimal routing paths in the global network in real time. Experimental results show that the proposed cross-domain intelligent routing method can significantly improve the network throughput and reduce the network delay and packet loss rate compared to those of the Dijkstra and OSPF routing methods.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 14 September 2022

Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J. and Sanjay Nakharu Prasad Kumar

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…

Abstract

Purpose

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.

Design/methodology/approach

This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.

Findings

The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.

Originality/value

The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 2000