Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 10 de 10
Filtrar
Más filtros











Base de datos
Intervalo de año de publicación
1.
Sensors (Basel) ; 23(19)2023 Oct 02.
Artículo en Inglés | MEDLINE | ID: mdl-37837054

RESUMEN

Vehicle ad hoc networks (VANETs) are a vital part of intelligent transportation systems (ITS), offering a variety of advantages from reduced traffic to increased road safety. Despite their benefits, VANETs remain vulnerable to various security threats, including severe blackhole attacks. In this paper, we propose a deep-learning-based secure routing (DLSR) protocol using a deep-learning-based clustering (DLC) protocol to establish a secure route against blackhole attacks. The main features and contributions of this paper are as follows. First, the DLSR protocol utilizes deep learning (DL) at each node to choose secure routing or normal routing while establishing secure routes. Additionally, we can identify the behavior of malicious nodes to determine the best possible next hop based on its fitness function value. Second, the DLC protocol is considered an underlying structure to enhance connectivity between nodes and reduce control overhead. Third, we design a deep neural network (DNN) model to optimize the fitness function in both DLSR and DLC protocols. The DLSR protocol considers parameters such as remaining energy, distance, and hop count, while the DLC protocol considers cosine similarity, cosine distance, and the node's remaining energy. Finally, from the performance results, we evaluate the performance of the proposed routing and clustering protocol in the viewpoints of packet delivery ratio, routing delay, control overhead, packet loss ratio, and number of packet losses. Additionally, we also exploit the impact of the mobility model such as reference point group mobility (RPGM) and random waypoint (RWP) on the network metrics.

2.
Sensors (Basel) ; 23(17)2023 Sep 04.
Artículo en Inglés | MEDLINE | ID: mdl-37688109

RESUMEN

Multihop transmission is one of the important techniques to overcome the transmission coverage of each node in wireless sensor networks (WSNs). However, multihop transmission has a security issue due to the nature of a wireless medium. Additionally, the eavesdropper also attempts to interrupt the legitimate users' transmission. Thus, in this paper, we study the secrecy performance of a multihop transmission under various eavesdropping attacks for WSNs. To improve the secrecy performance, we propose two node selection schemes in each cluster, namely, minimum node selection (MNS) and optimal node selection (ONS) schemes. To exploit the impact of the network parameters on the secrecy performance, we derive the closed-form expression of the secrecy outage probability (SOP) under different eavesdropping attacks. From the numerical results, the ONS scheme shows the most robust secrecy performance compared with the other schemes. However, the ONS scheme requires a lot of channel information to select the node in each cluster and transmit information. On the other side, the MNS scheme can reduce the amount of channel information compared with the ONS scheme, while the MNS scheme still provides secure transmission. In addition, the impact of the network parameters on the secrecy performance is also insightfully discussed in this paper. Moreover, we evaluate the trade-off of the proposed schemes between secrecy performance and computational complexity.

3.
Sensors (Basel) ; 23(18)2023 Sep 18.
Artículo en Inglés | MEDLINE | ID: mdl-37766016

RESUMEN

The network area is extended from ground to air. In order to efficiently manage various kinds of nodes, new network paradigms are needed such as cell-free massive multiple-input multiple-output (CF-mMIMO). Additionally, security is also considered as one of the important quality-of-services (QoS) parameters in future networks. Thus, in this paper, we propose a novel deep learning-based secure multicast routing protocol (DLSMR) in flying ad hoc networks (FANETs) with cell-free massive MIMO (CF-mMIMO). We consider the problem of wormhole attacks in the multicast routing process. To tackle this problem, we propose the DLSMR protocol, which utilizes a deep learning (DL) approach to predict the secure and unsecured route based on node ID, distance, destination sequence, hop count, and energy to avoid wormhole attacks. This work also addresses key concerns in FANETs such as security, scalability, and stability. The main contributions of this paper are as follows: (1) We propose a deep learning-based secure multicast routing protocol (DLSMR) to establish a high-stability multicast tree and improve security performance against wormhole attacks. In more detail, the DLSMR protocol predicts whether the route is secure based on network information such as node ID, distance, destination sequence, hop count, and remaining energy or not. (2) To improve the node connectivity and manage multicast members, we propose a top-down particle swarm optimization-based clustering (TD-PSO) protocol to maximize the cost function considering node degree, cosine similarity, cosine distance, and cluster head energy to guarantee convergence to the global optima. Thus, the TD-PSO protocol provides more strong connectivity. (3) Performance evaluations verify the proposed routing protocol establishes a secure route by avoiding wormhole attacks as well as by providing strong connectivity. The TD-PSO clustering supports connectivity to enhance network performance. In addition, we exploit the impact of the mobility model on the network metrics such as packet delivery ratio, routing delay, control overhead, packet loss ratio, and number of packet losses.

4.
Sensors (Basel) ; 22(15)2022 Aug 03.
Artículo en Inglés | MEDLINE | ID: mdl-35957367

RESUMEN

In ad-hoc vehicle networks (VANETs), the random mobility causes the rapid network topology change, which leads to the challenge of the reliable data transmission. In this paper, we propose a hybrid-price auction-based secure routing (HPA-SR) protocol using advanced speed and cosine similarity-based (ASCS) clustering to establish a secure route to avoid sinkhole attacks and improve connectivity between nodes. The main features and contributions of the proposed HPA-SR protocol are as follows. First, the HPA-SR protocol is employed by the first- and second-price auctions to avoid sinkhole attacks. More specifically, using the Markov decision process (MDP), each node can select a kind of auction method to establish the secure route by avoiding the sinkhole attack. Second, the advanced speed cosine similarity clustering protocol that is considered as underlying structure is presented to improve the connectivity between nodes. The ASCS is constructed based on the cosine similarity and distance between nodes using the speed and direction of the nodes. The results of the performance show that the proposed HPA-SR protocol can establish the secure route avoiding the sinkhole attack while the proposed ASCS clustering can support the strong connectivity. Besides, the HPA-SR with ASCS protocol can show better performance than the benchmark protocol in terms of the routing delay, packet loss ratio, number of packet loss, and control overhead.

5.
Sensors (Basel) ; 19(24)2019 Dec 11.
Artículo en Inglés | MEDLINE | ID: mdl-31835732

RESUMEN

This paper studies the secrecy performance of wireless power transfer (WPT)-based multi-hop transmissions in wireless sensors networks (WSNs), where legitimate nodes harvest energy from multiple power beacons (PBs) to support the multi-hop secure data transmission to a destination in the presence of an eavesdropper. Specifically, the PBs not only transfer radio frequency energy to the legitimate nodes but also act as friendly jammers to protect data transmission. To improve secrecy performance, we propose two secure scheduling schemes, named minimum node selection (MNS) scheme and optimal node selection (ONS) scheme. We then evaluate the performance of the proposed schemes in terms of the exact closed-form for secrecy outage probability (SOP) and asymptotic SOP. The developed analyses are verified by Monte-Carlo simulations. The numerical results show that the ONS scheme outperforms the MNS scheme emerging as an effective protocol for secure multi-hop transmission in WSNs. Furthermore, the effects of the number of PBs, number of hops, time switching ratio, and the secure target data rate on the system performance are also investigated.

6.
Sensors (Basel) ; 17(4)2017 Mar 27.
Artículo en Inglés | MEDLINE | ID: mdl-28346377

RESUMEN

This paper investigates the impact of using directional antennas and beamforming schemes on the connectivity of cognitive radio ad hoc networks (CRAHNs). Specifically, considering that secondary users use two kinds of directional antennas, i.e., uniform linear array (ULA) and uniform circular array (UCA) antennas, and two different beamforming schemes, i.e., randomized beamforming and center-directed to communicate with each other, we study the connectivity of all combination pairs of directional antennas and beamforming schemes and compare their performances to those of omnidirectional antennas. The results obtained in this paper show that, compared with omnidirectional transmission, beamforming transmission only benefits the connectivity when the density of secondary user is moderate. Moreover, the combination of UCA and randomized beamforming scheme gives the highest path connectivity in all evaluating scenarios. Finally, the number of antenna elements and degree of path loss greatly affect path connectivity in CRAHNs.

7.
Sensors (Basel) ; 17(2)2017 Feb 15.
Artículo en Inglés | MEDLINE | ID: mdl-28212286

RESUMEN

In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

8.
Sensors (Basel) ; 16(3): 295, 2016 Feb 26.
Artículo en Inglés | MEDLINE | ID: mdl-26927119

RESUMEN

In this paper, we study relay selection in decode-and-forward wireless energy harvesting cooperative networks. In contrast to conventional cooperative networks, the relays harvest energy from the source's radio-frequency radiation and then use that energy to forward the source information. Considering power splitting receiver architecture used at relays to harvest energy, we are concerned with the performance of two popular relay selection schemes, namely, partial relay selection (PRS) scheme and optimal relay selection (ORS) scheme. In particular, we analyze the system performance in terms of outage probability (OP) over independent and non-identical (i.n.i.d.) Rayleigh fading channels. We derive the closed-form approximations for the system outage probabilities of both schemes and validate the analysis by the Monte-Carlo simulation. The numerical results provide comprehensive performance comparison between the PRS and ORS schemes and reveal the effect of wireless energy harvesting on the outage performances of both schemes. Additionally, we also show the advantages and drawbacks of the wireless energy harvesting cooperative networks and compare to the conventional cooperative networks.

9.
Sensors (Basel) ; 15(2): 4388-407, 2015 Feb 13.
Artículo en Inglés | MEDLINE | ID: mdl-25688589

RESUMEN

In this paper we propose a soft-hard combination scheme, called SHC scheme, for cooperative spectrum sensing in cognitive radio networks. The SHC scheme deploys a cluster based network in which Likelihood Ratio Test (LRT)-based soft combination is applied at each cluster, and weighted decision fusion rule-based hard combination is utilized at the fusion center. The novelties of the SHC scheme are as follows: the structure of the SHC scheme reduces the complexity of cooperative detection which is an inherent limitation of soft combination schemes. By using the LRT, we can detect primary signals in a low signal-to-noise ratio regime (around an average of -15 dB). In addition, the computational complexity of the LRT is reduced since we derive the closed-form expression of the probability density function of LRT value. The SHC scheme also takes into account the different effects of large scale fading on different users in the wide area network. The simulation results show that the SHC scheme not only provides the better sensing performance compared to the conventional hard combination schemes, but also reduces sensing overhead in terms of reporting time compared to the conventional soft combination scheme using the LRT.

10.
Sensors (Basel) ; 14(5): 8037-56, 2014 May 05.
Artículo en Inglés | MEDLINE | ID: mdl-24803194

RESUMEN

In this paper, we propose cooperative spectrum sensing schemes, called decode-and-forward cooperative spectrum sensing (DF-CSS) scheme and amplify-and-forward cooperative spectrum sensing (AF-CSS) scheme, in cognitive radio networks. The main goals and features of the proposed cooperative spectrum sensing schemes are as follows: first, we solve the problem of high demand for bandwidth in a soft decision scheme using in our proposed schemes. Furthermore, the impact of transmission power of relaying users which is determined by the interference constraint on sensing performance of cooperative spectrum sensing schemes is also investigated. Second, we analyze the sensing performance of our proposed cooperative spectrum sensing schemes in terms of detection probability and interference probability, respectively. We take into account the interference caused by secondary user (SU) to primary user (PU) in the case that the transmission power of the relaying users exceeds a predefined interference constraint assigned by the primary user. The simulation results show that in cooperative spectrum sensing schemes the total sensing performance depends not only on the interference tolerance level, but also on the relay protocols used. We also prove that high transmission power of relaying users increases the interference between the secondary networks and the primary network.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA