Search results
1 – 10 of 107Ishita Seth, Kalpna Guleria and Surya Narayan Panda
The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…
Abstract
Purpose
The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.
Design/methodology/approach
The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.
Findings
The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.
Originality/value
The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.
Details
Keywords
In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…
Abstract
Purpose
In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.
Design/methodology/approach
A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.
Findings
When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.
Originality/value
Additionally, it reduces the amount of routing overhead and the average end-to-end delay.
Details
Keywords
Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
Abstract
Purpose
Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.
Design/methodology/approach
Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.
Findings
Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.
Research limitations/implications
Other optimization techniques can be applied for WSN to analyze the performance.
Practical implications
Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.
Social implications
Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.
Originality/value
Literature survey is carried out to find the methods which give better performance.
Details
Keywords
Prajakta Thakare and Ravi Sankar V.
Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating…
Abstract
Purpose
Agriculture is the backbone of a country, contributing more than half of the sector of economy throughout the world. The need for precision agriculture is essential in evaluating the conditions of the crops with the aim of determining the proper selection of pesticides. The conventional method of pest detection fails to be stable and provides limited accuracy in the prediction. This paper aims to propose an automatic pest detection module for the accurate detection of pests using the hybrid optimization controlled deep learning model.
Design/methodology/approach
The paper proposes an advanced pest detection strategy based on deep learning strategy through wireless sensor network (WSN) in the agricultural fields. Initially, the WSN consisting of number of nodes and a sink are clustered as number of clusters. Each cluster comprises a cluster head (CH) and a number of nodes, where the CH involves in the transfer of data to the sink node of the WSN and the CH is selected using the fractional ant bee colony optimization (FABC) algorithm. The routing process is executed using the protruder optimization algorithm that helps in the transfer of image data to the sink node through the optimal CH. The sink node acts as the data aggregator and the collection of image data thus obtained acts as the input database to be processed to find the type of pest in the agricultural field. The image data is pre-processed to remove the artifacts present in the image and the pre-processed image is then subjected to feature extraction process, through which the significant local directional pattern, local binary pattern, local optimal-oriented pattern (LOOP) and local ternary pattern (LTP) features are extracted. The extracted features are then fed to the deep-convolutional neural network (CNN) in such a way to detect the type of pests in the agricultural field. The weights of the deep-CNN are tuned optimally using the proposed MFGHO optimization algorithm that is developed with the combined characteristics of navigating search agents and the swarming search agents.
Findings
The analysis using insect identification from habitus image Database based on the performance metrics, such as accuracy, specificity and sensitivity, reveals the effectiveness of the proposed MFGHO-based deep-CNN in detecting the pests in crops. The analysis proves that the proposed classifier using the FABC+protruder optimization-based data aggregation strategy obtains an accuracy of 94.3482%, sensitivity of 93.3247% and the specificity of 94.5263%, which is high as compared to the existing methods.
Originality/value
The proposed MFGHO optimization-based deep-CNN is used for the detection of pest in the crop fields to ensure the better selection of proper cost-effective pesticides for the crop fields in such a way to increase the production. The proposed MFGHO algorithm is developed with the integrated characteristic features of navigating search agents and the swarming search agents in such a way to facilitate the optimal tuning of the hyperparameters in the deep-CNN classifier for the detection of pests in the crop fields.
Details
Keywords
Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…
Abstract
Purpose
Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.
Design/methodology/approach
The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.
Findings
The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.
Originality/value
According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.
Details
Keywords
Jacobus Gerhardus J. Nortje and Daniel Christoffel Myburgh
The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of…
Abstract
Purpose
The purpose of this paper is to identify and discuss impediments in the compilation of an application for a search and seizure warrant for digital evidence and the structure of such a warrant in South African criminal cases.
Design/methodology/approach
This paper provides a brief overview of international and local impediments, followed by a detailed discussion of the implications of these impediments and how it is approached in various jurisdictions. The methodology of this paper consists of a literature review.
Findings
Addressing the impediments in the compilation of the application and the warrant will be beneficial for forensic investigators, the South African Police Service (SAPS) and the administration of justice in South Africa.
Research limitations/implications
Search and seizures for digital evidence form part of civil, regulatory and criminal search and seizures. This study focuses on the search and seizure of digital evidence in criminal matters pursuant to mainly the provisions of the Criminal Procedure Act 51 of 1977 and the Cybercrimes Act 19 of 2020.
Originality/value
The originality of this paper lies in the approach to the drafting of applications for search and seizure warrants for digital information in South Africa. The contribution of the study is that, by using this approach, the SAPS can address the impediments during the application and compilation of the warrants, which would enhance the quality of investigations and contribute to the successful investigation and prosecution of crime in South Africa.
Details
Keywords
Mario Henrique Callefi, Gilberto Miller Devós Ganga, Moacir Godinho Filho, Elias Ribeiro da Silva, Lauro Osiro and Vasco Reis
Road freight transportation companies need to take advantage of information and communication technologies to develop capabilities. This study proposes a framework to guide road…
Abstract
Purpose
Road freight transportation companies need to take advantage of information and communication technologies to develop capabilities. This study proposes a framework to guide road freight transportation companies to achieve data visibility in their operations by developing such capabilities. By proposing this framework, this research contributes to literature and practice, highlighting the capabilities and the respective supporting technologies for improved data visibility in road freight transportation.
Design/methodology/approach
A mixed-method approach is used to develop the framework, considering three methodological steps. In phase 1, the capabilities are identified in the literature and validated by experts. In phase 2, an empirical assessment of cause–effect relationships between capabilities is performed using a multiple case study and DEMATEL. Lastly, in phase 3, an analysis of the cause model and significant associations is conducted to enable the development of the framework. In addition, the proposed framework was validated by the experts interviewed.
Findings
The results provide a framework that explains the link between the technology-enabled data visibility capabilities in road freight transportation operations. In addition, a pathway was established that road freight transportation companies could follow to achieve data visibility in their operations by developing such capabilities.
Originality/value
This work develops the first framework that provides a path for data visibility in road freight transportation operations from adopting certain technologies. The insights are compelling for researchers and practitioners to optimize the decision-making process for adopting technologies and developing capabilities related to data visibility.
Details
Keywords
Raghavendra Rao N.S. and Chitra A.
The purpose of this study is to propose an extended reliability method for an industrial motor drive by integrating the physics of failure (PoF).
Abstract
Purpose
The purpose of this study is to propose an extended reliability method for an industrial motor drive by integrating the physics of failure (PoF).
Design/methodology/approach
Industrial motor drive systems (IMDS) are currently expected to perform beyond the desired operating conditions to meet the demand. The PoF of the subsystem affects its reliability under such harsh operating circumstances. It is crucial to estimate reliability by integrating PoF, which helps in understanding its impact and to develop a fault-tolerant design, particularly in such an integrated drive system. An integrated PoF extended reliability method for industrial drive system is proposed to address this issue. In research, the numerical failure rate of each component of industrial drive is obtained first with the help of the MIL-HDBK-217 military handbook. Furthermore, the mathematically deduced proposed approach is modeled in the GoldSim Monte Carlo reliability workbench.
Findings
From the results, for a 15% rise in integrated PoF, the reliability and availability of the entire IMDS dropped by 23%, resulting in an impact on mean time to failure (MTTF).
Originality/value
The integrated PoF of the motor and motor controller affects industrial drive reliability, which falls to 0.18 with the least MTTF (2.27 years); whose overall reliability of industrial drive drops to 0.06 if it is additionally integrated with communication protocol.
Details
Keywords
Billy Melo Araujo and Dylan Wilkinson
The Ireland-Northern Ireland Protocol has been one of the most contentious aspects of the EU-UK post-Brexit trade relationship. By requiring the UK to comply with EU customs and…
Abstract
Purpose
The Ireland-Northern Ireland Protocol has been one of the most contentious aspects of the EU-UK post-Brexit trade relationship. By requiring the UK to comply with EU customs and internal market rules in relation to Northern Ireland (NI), the Protocol has created a hybrid trade regime where NI is subject to multiple, overlapping and often conflicting rules. This paper aims to examine one area in which this hybridity manifests itself. It focusses on the interplay between the Protocol and post-Brexit UK trade agreements. It examines potential areas of conflict between Protocol obligations and obligations derived from UK trade agreements. In doing so, it sheds light on the extent to which compliance with the Protocol may undermine NI’s ability to export and import goods under the preferential terms negotiated under UK trade agreements. It further discusses the consequences of these incompatibilities between the Protocol and these agreements for NI and, more widely, the functioning of the UK internal market as whole.
Design/methodology/approach
Doctrinal legal research
Findings
The paper examines potential areas of conflict between Protocol obligations and obligations derived from UK trade agreements. In doing so, it sheds light on the extent to which compliance with the Protocol may undermine NI’s ability to export and import goods under the preferential terms negotiated under UK trade agreements. It further discusses the consequences of these incompatibilities between the Protocol and these agreements for NI and, more widely, the functioning of the UK internal market as whole.
Originality/value
To the best of the authors’ knowledge this is the first paper carrying out a comprehensive legal analysis of the interaction and potential conflicts between the Protocol on Ireland-Northern Ireland and the UK’s post Brexit trade agreements.
Details