Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Roslin, S. Emalda
- Performance Analysis of Malicious Node Detection in Wireless Multimedia Sensor Networks using Modified LeNET Architecture
Abstract Views :194 |
PDF Views:3
Authors
Affiliations
1 Faculty of Electronics, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, IN
2 Department of ECE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, IN
1 Faculty of Electronics, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, IN
2 Department of ECE, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 2 (2022), Pagination: 179-188Abstract
The routing performance in Wireless Multimedia Sensor Network (WMSN), which transfers and receives multimedia content like a scalar, audio and video, is often affected by malicious nodes and residual nodes. An external attacker modifies the characteristics function of the node, and thus the node becomes malicious nodes in WMSN. These malicious nodes will affect the functionalities of its surrounding nodes and prevent routing through it and other nodes. Hence, the detection and mitigation of malicious nodes are essential to improve the routing efficiency in WMSN. The conventional methods mainly used machine learning algorithms to identify the malicious nodes in WMSN, which provided low accuracy and consumed more detection time as the main drawbacks. The proposed methodology resolves these drawbacks of the conventional algorithms in this paper. This paper presents an efficient method for detecting and mitigating the malicious nodes using feature index, which is optimized by a Genetic Algorithm (GA). The optimized feature set is classified by the modified LeNET deep learning classification approach. Even though conventional deep learning architectures provide a high classification rate for malicious node detection, it consumes a high detection time to identify malicious nodes. This drawback is overcome by modifying the internal layers of the existing LeNET architecture into parallel, and the dense layers in the existing LeNET architecture are replaced by Fuzzy C Means (FCM) algorithm. The performance of the proposed methodology is analyzed with respect to misclassification rate, precision, recall, accuracy and F1-score parameters.Keywords
Wireless Multimedia Sensor Network, Malicious Node, Detection, Mitigation, Classification, Genetic Algorithm, FCM.References
- Jin, S., Yuanzhi, W. & Yining, S., “Design and implementation of wireless multimedia sensor network node based on FPGA and binocular vision”, J Wireless Com Network (2018) 2018: 163.
- Zou K., Ouyang Y., Niu C., Zou Y. (2012) Simulation of Malicious Nodes Detection Based on Machine Learing for WSN. In: Liu C., Wang L., Yang A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 307. Springer, Berlin, Heidelberg.
- Roman, R., Zhou, J., Lopez, J.: Applying intrusion detection systems to wireless sensor networks. In: CCNC 2006: Proceeding of the 3rd IEEE Consumer Communications and Networking Conference, pp. 640–644. IEEE, NJ (2006) [
- Kaplantzis, S., Shilton, A., Mani, N., et al.: Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines. In: ISSNIP, vol. 10, pp. 335–340 (2007).
- Liu, H., Cui, J., Dai, H.: Malicious nodes detecting in wireless sensor networks based on multivariate classification algorithm. Journal of Sensor Technology 24, 771–777 (2011).
- Xiao, D., Chen, C., Chen, G.: Intrusion detection based security architecture for wireless sensor networks. In: ISCIT 2005: Proceeding of the International Symposium on Communications and Information Technologies, pp. 1365–1368. IEEE, WuHan (2005).
- Shaikh RA, Jameel H, d’Auriol BJ, Lee H, Lee S (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698–1712.
- Huang X, Fang Y (2008) Multiconstrained qos multipath routing in wireless sensor networks. Wirel Netw 14(4):465–478.
- Zhiming Zhang, Yu Yang, Wei Yang, Fuying Wu, Ping Li, XiaoyongXiong, "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks", Security and Communication Networks, vol. 2021, Article ID 9082570, 12 pages, 2021.
- L. K. Ramasamy, F. Khan K. P., A. L. Imoize, J. O. Ogbebor, S. Kadry and S. Rho, "Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey," in IEEE Access, vol. 9, pp. 128765-128785, 2021.
- Alzubaidi, L., Zhang, J., Humaidi, A.J. et al. Review of deep learning: concepts, CNN architectures, challenges, applications, future directions. J Big Data 8, 53 (2021).
- M. Koyuncu, A. Yazici, M. Civelek, A. Cosar and M. Sert, "Visual and Auditory Data Fusion for Energy-Efficient and Improved Object Recognition in Wireless Multimedia Sensor Networks," in IEEE Sensors Journal, vol. 19, no. 5, pp. 1839-1849, 1 March1, 2019.
- Ahmed Salim, WalidOsamy and Ahmed M. Khedr , “Effective Scheduling Strategy in Wireless Multimedia Sensor Networks for Critical Surveillance Applications”, Appl. Math. Inf. Sci. 12, No. 1, 101-111 (2018).
- Harsh Bhatt; MalaramKumhar, “QoE Aware Routing Protocols in Wireless Multimedia Sensor Networks: A Survey”, IJCSN - International Journal of Computer Science and Network, Volume 7, Issue 1, February 2018.
- J. Pournazari, M. Alaei and F. Yazdanpanah, "A method for coverage optimization in wireless multimedia sensor networks," 2016 Eighth International Conference on Information and Knowledge Technology (IKT), Hamedan, 2016, pp. 128-133.
- Li W. (2012) PSO Based Wireless Sensor Networks Coverage Optimization on DEMs. In: Huang DS.,Gan Y., Gupta P., Gromiha M.M. (eds) Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence. ICIC 2011. Lecture Notes in Computer Science, vol 6839. Springer, Berlin, Heidelberg.
- Domínguez-Medina C., Cruz-Cortés N. (2010) Routing Algorithms for Wireless Sensor Networks Using Ant Colony Optimization. In: Sidorov G., Hernández Aguirre A., Reyes García C.A. (eds) Advances in Soft Computing. MICAI 2010. Lecture Notes in Computer Science, vol 6438. Springer, Berlin, Heidelberg.
- Zhao Jing, Zeng Jian-Chao, "A virtual centripetal force-based coverage-enhancing algorithm for wireless multimedia sensor networks", Sensors Journal (IEEE), vol. 10, no. 8, pp. 1328-1334, 2010.
- Haining Chen, Hongyi Wu, Nian-Feng Tzeng, "Grid-based Approach for Working Node Selection in Wireless Sensor Networks", Communications IEEE International Conference, vol. 6, pp. 3673-3678, 2009.
- Muhammad Kamal Amjad, ShahidIkramullah Butt, RubeenaKousar, et al., “Recent Research Trends in Genetic Algorithm Based Flexible Job Shop Scheduling Problems,” Mathematical Problems in Engineering, vol. 2018, Article ID 9270802, 32 pages, 2018.
- Li X, Zhang J, Yin M., “Animal migration optimization: an optimization algorithm inspired by animal migration behavior,” Neural Comput & Applic., vol. 24, no. (7–8), pp. 1867–1877, 2013.
- Rinki Gupta, SreeramanRajan, “Comparative Analysis of Convolution Neural Network Models for Continuous Indian Sign Language Classification”, Procedia Computer Science 171 (2020) 1542–1550.
- Jiashun Chen, Hao Zhang, Dechang Pi, Mehmed Kantardzic, Qi Yin, Xin Liu, "A Weight Possibilistic Fuzzy C-Means Clustering Algorithm", Scientific Programming, vol. 2021, Article ID 9965813, 10 pages, 2021.
- M. S. Nidhya, Dr. M. Vanitha, Dr. L. Jayanthi, Mr. L. Vadivel Kannan, Mr. S. Ajay, Mr. S. Gowdham Kumar, Dr. S. Sangeetha. (2021). A Detection of Malicious Nodes in HCCT Model for Wireless Sensor Network. Annals of the Romanian Society for Cell Biology, 1570–1579.
- Chen Jian, Zhang Lu, KuoYonghong, "Coverage-enhancing algorithm based on overlap-sense ratio in wireless multimedia sensor networks", Sensors Journal (IEEE), vol. 13, no. 6, pp. 2077-2083, 2013.
- Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks
Abstract Views :121 |
PDF Views:1
Authors
Affiliations
1 Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, IN
1 Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology, Chennai, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 9, No 5 (2022), Pagination: 568-577Abstract
The rising wireless service constraints and user compactness have to lead the progress of 6G communication in the modern days. The benefit of 6G over the presented technologies is a huge support for mixed applications and mobility maintenance. Device to Device (D2D) data transmission in 6G has great attention since it gives a better data delivery rate (DDR). Recently, several methods were established for D2D data transmission. However, energy consumption was not considered to improve the network throughput. To handle such problems, an artificial intelligence technique called Deep Neural Regressive Tangent Transfer Classifier (DNRTTC) model is introduced in this research for D2D data transmission in a 6G system. The designed method includes several layers to attain energy-efficient D2D data transmission. The primary layer is the input layer and it includes several mobile nodes as input. Nodes are transmitted to the hidden layer one. For each node, energy, received signal strength, and connection speed of each mobile node is calculated. Then the similarity analysis is done in the following layer where each node is analyzed with its threshold value. The result is sent to the output layer where the better resource mobile nodes are identified by using the activation function. This leads to attaining energy-efficient D2D data transmission in 6G. Results illustrate that the DNRTTC outperformed compared to conventional methods with better energy efficiency, packet delivery ratio, and throughput.Keywords
Artificial Intelligent, Device to Device Data Transmission, 6G Network, Energy Efficiency, Deep Neural Network, Mobile Nodes, Activation FunctionReferences
- Shunpu Tang, Wenqi Zhou, Lunyuan Chen, Lijia Lai, Junjuan Xia and Liseng Fan, “Battery-constrained Federated Edge Learning in UAVenabled IoT for B5G/6G Networks”, Elsevier, Physical
- Communication, Vol. 47, August 2021, pp. 1-9
- Aldosary Saad, Mohammed Al-Ma’aitah and AyedAlwadain, “6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects”, Computer Communications, Elsevier, Vol. 160, 1 July 2020, pp. 749-758
- Yaru Fu, Khai Nguyen Doan and Tony Q.S.Quek, “On
- recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm”, Digital Communications and Networks, Vol. 6, Issue 3, August 2020, pp. 304311
- Haodong Li, Fang Fang and Zhiguo Ding, “Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks”, Digital Communications and Networks, Vol. 6, Issue 3, August 2020, pp. 241-252
- Wail Mardini, ShadiAljawarneh and Amnah Al-Abdi, “Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems”, Springer, Mobile Networks and Applications, 2020, pp. 1-17
- P. Mohamed Shakeel, S. Baskar, Hassan Fouad, Gunasekaran Manogaran, Vijayalakshmi Saravanan and Qin Xin, “Creating Collision-Free Communication in IoT with 6G Using Multiple Machine Access Learning Collision Avoidance Protocol”, Mobile Networks and Applications, Springer, 2020, pp. 1-12
- Steffi Jayakumar and Nandakumar S, “A review on resource allocation techniques in D2D communication for 5G and B5G technology”, Peerto-Peer Networking and Applications, Springer, Vol. 14, 2021, pp.243– 269
- Mustafa Ergen, FerideInan, OnurErgen, IbraheemShayea, Mehmet FatihTuysuz, AzizulAzizan, Nazim Kemal Ure and MaziarNekovee, “Edge on Wheels With OMNIBUS Networkingfor 6G Technology”, IEEE Access, Vol. 8, 2020, pp. 110172- 110188
- Agbotiname Lucky Imoize, Oluwadara Adedeji, NisthaTandiya and Sachin Shetty, “6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap”, Sensors, Vol. 21, Issue 5, 2021, pp. 1-58
- Yiqing Zhou, Ling Liu, Lu Wang, Ning Hui, Xinyu Cui, Jie Wu, Yan Peng, Yanli Qi and Chengwen Xing, “Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching”, Digital Communications and Networks, Vol.
- , Issue 3, August 2020, pp. 253-260
- Sahar Kouroshnezhad, Ali Peiravi, Mohammad SayadHaghighi and Alireza Jolfaei, “Energy-Efficient Drone Trajectory Planning for the Localization of 6G-enabled IoT Devices”, IEEE Internet of Things Journal, Vol.: 8, Issue: 7, April1 1, 2021, pp. 5202 – 5210
- Md Akbar Hossain, Sayan Kumar Ray, Jaswinder Lota, “SmartDR:A device-to-device communication for post-disaster recovery”, Journal of Network and Computer Applications, Elsevier, Journal of Network and Computer Applications, Vol. 171, 2020, pp. 1-12
- Karan Sheth, Keyur Patel, Het Shah, Sudeep Tanwar, Rajesh Gupta and Neeraj Kumar, “A taxonomy of AI techniques for 6G communication networks”, Computer Communications, Elsevier, Vol. 161, 2020, pp.279-303
- Agbotiname Lucky Imoize, Oluwadara Adedeji, NisthaTandiya and Sachin Shetty, “6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap”, Sensors, Vol. 21, Issue 5, 2021, pp. 1-58
- Qiao Qi, Xiaoming Chen, Caijun Zhong, Zhaoyang Zhang, “Integration of Energy, Computation and Communication in 6G Cellular Internet of Things”, IEEE Communications Letters , Vol. 24, Issue 6, 2020, pp. 1333 – 1337
- Liang Xu, “Application of wearable devices in 6G internet of things communication environment using artificial intelligence”, International Journal of System Assurance Engineering and Management, Springer, 2021
- V. K. Gnanavel and A. Srinivasan, “Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks”, Peer-to-Peer Networking and Applications, Springer, 2020, pp. 1-10
- Yifei Yuan, Yajun Zhao, BaiqingZong and Sergio Parolari, “Potential key technologies for 6G mobile communications”, Science China Information Sciences, Springer, Vol. 63, 2020, pp. 1-19
- Amrit Mukherjee, Pratik Goswami, Mohammad Ayoub Khan, Li Manman, Lixia Yang and Prashant Pillai, “Energy-Efficient Resource Allocation Strategy in Massive IoT for Industrial 6G Applications”, IEEE Internet of Things Journal, Vol. 8, Issue 7, 2021, pp. 5194 – 5201
- Meiyu Wang, Yun Lin, Qiao Tian and Guangzhen Si, “Transfer Learning Promotes 6G Wireless Communications: Recent Advances and Future Challenges”, IEEE Transactions on Reliability, Vol. 70, Issue 2, 2021, pp. 790 – 807
- Marco Giordani, Michele Polese, Marco Mezzavilla, Sundeep Rangan and Michele Zorzi, “Towards 6G Networks: Use Cases and
- Technologies”, Computer Science, Vol. 58, 2020, pp. 1-8
- Syed Junaid Nawaz, Shree K. Sharma, Shurjeel Wyne, Mohammad N. Patwary, Md Asaduzzaman, “Quantum Machine Learning for 6G Communication Networks: State-of-the-Art and Vision for the Future”, IEEE Access, Vol. 7, April 2019, pp. 46317 – 46350
- Mostafa Zaman Chowdhury, Md. Shahjalal, Moh Khalid Hasan and Yeong Min Jang, “The Role of Optical Wireless Communication Technologies in 5G/6G and IoT Solutions: Prospects, Directions, and Challenges”, Applied Sciences, Vol. 9, Issue 20, 2019, pp. 43-67
- Mohammad Maroufi, Reza Abdolee, and Behzadmozaffaritazekand, “On the Convergence of Blockchain and Internet of Things (IoT) Technologies”, Wireless Communication, Vol. 14, March 2019 pp. 111
- Yueyue Dai, Du Xu, Sabita Maharjan, Zhuang Chen, Qian He, and Yan Zhang, “Blockchain and Deep Reinforcement Learning Empowered Intelligent 5G Beyond” Intelligent Network Assisted by Cognitive Computing and Machine Learning, Vol. 33, 2019, pp. 10-17
- Marco Giordani, Michele Polese, Marco Mezzavilla, Sundeep Rangan and Michele Zorzi, “Towards 6G Networks: Use Cases and
- Technologies”, Computer Science, Vol. 58, 2020, pp. 1-8
- Varadala Sridhar, S.Emalda Roslin, Latency and Energy Efficient BioInspired Conic Optimized and Distributed Q Learning for D2D Communication in ,IETE journal of
- Research,Doi:10.1080/03772063.2021.1906768 ,2021,pp.1-12.
- Varadala Sridhar, S.Emalda Roslin,Resource Aware Quadratic Discriminative Gentle Steepest Boost Classification for D2D Communication in 5G,International Journal of Engineering Trends and Technology,Volume 70 Issue 5, 357-366, May 2022.