Search results
1 – 10 of 52Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…
Abstract
Purpose
In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.
Design/methodology/approach
A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.
Findings
When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.
Originality/value
Additionally, it reduces the amount of routing overhead and the average end-to-end delay.
Details
Keywords
Souad El Houssaini, Mohammed-Alamine El Houssaini and Jamal El Kafi
In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly…
Abstract
Purpose
In vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can directly perturb the performance of the networks and then provoke big fall of capability. Black hole attack is an example such attack, where the attacker node pretends that having the shortest path to the destination node and then drops the packets. This paper aims to present a new method to detect the black hole attack in real-time in a VANET network.
Design/methodology/approach
This method is based on capability indicators that are widely used in industrial production processes. If the different capability indicators are greater than 1.33 and the stability ratio (Sr) is greater than 75%, the network is stable and the vehicles are communicating in an environment without the black hole attack. When the malicious nodes representing the black hole attacks are activated one by one, the fall of capability becomes more visible and the network is unstable, out of control and unmanaged, due to the presence of the attacks. The simulations were conducted using NS-3 for the network simulation and simulation of urban mobility for generating the mobility model.
Findings
The proposed mechanism does not impose significant overheads or extensive modifications in the standard Institute of Electrical and Electronics Engineers 802.11p or in the routing protocols. In addition, it can be implemented at any receiving node which allows identifying malicious nodes in real-time. The simulation results demonstrated the effectiveness of proposed scheme to detect the impact of the attack very early, especially with the use of the short-term capability indicators (Cp, Cpk and Cpm) of each performance metrics (throughput and packet loss ratio), which are more efficient at detecting quickly and very early the small deviations over a very short time. This study also calculated another indicator of network stability which is Sr, which allows to make a final decision if the network is under control and that the vehicles are communicating in an environment without the black hole attack.
Originality/value
According to the best of the authors’ knowledge, the method, using capability indicators for detecting the black hole attack in VANETs, has not been presented previously in the literature.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…
Abstract
Purpose
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.
Design/methodology/approach
The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.
Findings
The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.
Originality/value
According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.
Details
Keywords
Allan Farias Fávaro, Roderval Marcelino and Cristian Cechinel
This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to…
Abstract
Purpose
This paper presents a review of the state of the art on the application of blockchain and smart contracts to the peer-review process of scientific papers. The paper seeks to analyse how the main characteristics of the existing blockchain solutions in this field to detect opportunities for the improvement of future applications.
Design/methodology/approach
A systematic review of the literature on the subject was carried out in three databases recognized by the research community (IEEE Xplore, Scopus and Web of Science) and the Frontiers in Blockchain journal. A total of 1,967 articles were initially found, and after the exclusion process, the 26 remaining articles were classified according to the following dimensions: System Type, Open Access, Review Type, Reviewer Incentive, Token Economy, Blockchain Access, Blockchain Identification, Blockchain Used, Paper Storage, Anonymity and Maturity of the solution.
Findings
Results show that the solutions are normally concerned on offering incentives to the reviewers' work (often monetary). Other common general preferences among the solutions are the adoption of open reviews, the use of Ethereum, the implementation of publishing ecosystems and the use of InterPlanetary File System to the storage of the papers.
Originality/value
There are currently no studies covering the main aspects of blockchain solutions in the field of scientific peer review. The present study provides an overall review of the topic, summarizing important information on the current research and helping new adopters to develop solutions grounded on the existing literature.
Details
Keywords
This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.
Abstract
Purpose
This study aims to give a glimpse of the existing blockchain applications across industries and add to a complete knowledge of the blockchain’s properties.
Design/methodology/approach
Systematic literature review is used as the research strategy for this investigation and other aspects of the preferred reporting items for systematic reviews and meta-analyses framework have been incorporated to create a scholarly publications evaluation of the blockchain-based application in the financial arena and its future. The research looks at 86 studies published between 2018 and 2022.
Findings
There has been a steady but noticeable increase in the study of blockchain’s potential in many application domains over the past few of years. This rising tendency illustrates the newness and potential of blockchain technology, as well as the increasing attention from academics. According to the findings, blockchain is an appropriate solution for processing transactions using cryptocurrencies; nevertheless, it still has significant technical issues and limits that require to be exploring and solving before it can be considered a viable option. It is therefore, necessary to have a high level of reliability for payments and confidentiality, in addition to maintaining the anonymity of nodes, to stop assaults and efforts to disrupt transactions in the blockchain.
Practical implications
This study has several important theoretical and practical implications. First, it adds to the body of knowledge on blockchain and Fintech, focusing on the transaction side. While much blockchain research has focused on how the technology may affect strategic choices, this study has shed light on its potential from the perspective of financial reporting. Second, by highlighting the importance of the demand for the prompt identification of losses, this work adds to the body of knowledge on the factors that influence transaction frauds involving paper money. Additionally, by establishing the link between transparency and virtual transactions, the author backs up the asymmetric responses of investors to different investment possibilities. It looks at the evolution of financial technology (Fintech) and shows how it can be used to take the advantage of unique opportunities.
Originality/value
The study is different and novel from the previously published literature on this topic mainly because of its comprehensiveness, as it revolves around all industrial and commercial areas. The three main lines of research have been outlined, namely, classifying the many blockchain-based innovations that will alter the financial landscape in many industries; identifying whether these industries are a good fit for blockchain’s wealth creation potential; and directing researchers by outlining prospective study pathways.
Details
Keywords
Ado Adamou Abba Ari, Olga Kengni Ngangmo, Chafiq Titouna, Ousmane Thiare, Kolyang, Alidou Mohamadou and Abdelhak Mourad Gueroui
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the…
Abstract
The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.
Details
Keywords
Feng Zhang, Youliang Wei and Tao Feng
GraphQL is a new Open API specification that allows clients to send queries and obtain data flexibly according to their needs. However, a high-complexity GraphQL query may lead to…
Abstract
Purpose
GraphQL is a new Open API specification that allows clients to send queries and obtain data flexibly according to their needs. However, a high-complexity GraphQL query may lead to an excessive data volume of the query result, which causes problems such as resource overload of the API server. Therefore, this paper aims to address this issue by predicting the response data volume of a GraphQL query statement.
Design/methodology/approach
This paper proposes a GraphQL response data volume prediction approach based on Code2Vec and AutoML. First, a GraphQL query statement is transformed into a path collection of an abstract syntax tree based on the idea of Code2Vec, and then the query is aggregated into a vector with the fixed length. Finally, the response result data volume is predicted by a fully connected neural network. To further improve the prediction accuracy, the prediction results of embedded features are combined with the field features and summary features of the query statement to predict the final response data volume by the AutoML model.
Findings
Experiments on two public GraphQL API data sets, GitHub and Yelp, show that the accuracy of the proposed approach is 15.85% and 50.31% higher than existing GraphQL response volume prediction approaches based on machine learning techniques, respectively.
Originality/value
This paper proposes an approach that combines Code2Vec and AutoML for GraphQL query response data volume prediction with higher accuracy.
Details
Keywords
Denis Scott, Ling Ma and Tim Broyd
Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA…
Abstract
Purpose
Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA) payment strategy in 2012 to mitigate main contractors unfairly withholding liabilities. However, PBAs suffer from adoption challenges, such as systems fragmentation and a lack of incentives for main contractors to adopt them effectively. This study aims to investigate how to reduce systems fragmentation in construction by integrating PBA procedures with existing management workflows to increase payment automation, resulting in improved cash liquidity and better incentives for using PBAs.
Design/methodology/approach
A PBA blockchain decentralised application is developed, presented and critically evaluated. Blockchain is the technology used because of its permissionless, license-free, open-source and immutability properties. It is a suitable general-purpose technology layer for building and testing applications without the limitations associated with centralised technologies, such as high proprietary fees, vendor lock and intellectual property restrictions.
Findings
The research demonstrates how a blockchain application can integrate siloed construction workflows such as cash flow scheduling, supply chain management and payment executions, reducing the management workload for implementing PBAs in construction projects. Furthermore, the proposed application is open-source and replicable, and its user interface is available for external testing here: https://console.atra.io/app/bf26f846-7f16-4f80-90a0-c5488ab6edd3.
Originality/value
PBA is a suitable test case because it enforces an auditable, transparent and neutral account, which are inbuilt properties of blockchains; thus, both systems are harmonious to integrate. PBA is mandated in UK public sector construction projects; therefore, the research has a solid practical foundation.
Details