Tuesday, December 11, 2018

Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection

Tony Jan  and A.S.M Sajeev 

Melbourne Institute of Technology, Australia 

ABSTRACT

 This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required. 

KEYWORDS

adaboosted ensemble learning, IoT edge security, machine learning for IoT.

A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane

SmineshC. N.1 , Grace Mary Kanaga E.2 , and Ranjitha K.3 

 1&3 Dept. of Computer Science and Engineering, Govt. Engineering College, Thrissur, India 2 Dept. of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India 

ABSTRACT

 The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters. 

KEYWORDS

Bayesian Network, QoS, SDN, Traffic Engineering, Congestion Propagation.



Improvement of Multiple Routing Based on Fuzzy Clustering and PSO Algorithm In WSNs to Reduce Energy Consumption

Gholamreza Farahani 

Department of Electrical Engineering and Information Technology, Iranian Research Organization for Science and Technology (IROST), Tehran, Iran 

ABSTRACT

One of the most important issues discussed in Wireless Sensor Networks (WSNs) is how to transfer information from nodes within the network to the base station and select the best possible route for transmission of this information, taking into account energy consumption for the network lifetime with maximum reliability and security. Hence, it would be useful to provide a suitable method that would have the features mentioned. This paper uses an Ad-hoc On-demand Multipath Distance Vector (AOMDV) as a routing protocol. This protocol has high energy consumption due to its multipath. However, it is a big challenge if it can reduce AOMDV energy consumption. Therefore, clustering operations for nodes are of high priority to determine the head of clusters which LEACH protocol and fuzzy logic and Particle Swarm Optimization (PSO) algorithm are used for this purpose. Simulation results represent 5% improvement in energy consumption in a WSN compared to AOMDV method. 

KEYWORDS

Energy Aware Routing Protocol, Fuzzy Logic, Ad-hoc Multipath, LEACH, Particle Swarm Optimization Algorithm.

Availability Aspects Through Optimization Techniques Based Outlier Detection Mechanism in Wireless and Mobile Networks

Neeraj Chugh, Adarsh Kumar and Alok Aggarwal 

School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India 

ABSTRACT

Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS) attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared to Kumar et al. protocol.

 KEYWORDS

 WSN, MANET, RFID, ANOMALY, SECURITY

A Novel Adaptive Caching Mechanism for Video on Demand System Over Wireless Mobile Network

Saleh Ali Alomari 

Faculty of Sciences and Information Technology, Jadara University, Irbid, Jordan 

ABSTRACT

 Video on Demand (VOD) system over the wireless mobile network is a system that provides video services to mobile clients. The main problem with these systems is the high service delay where the mobile clients have to wait to view their favorite movie. The importance of this paper is based on finding a solution on how to reduce the delay time in the VOD system. This paper introduces a novel caching mechanism named Proxy Server Cache mechanism to tackle the issue of service delay. This delay happens when the broadcasting phase that is related to the first segment is missed by a client from the current broadcasting channels. In this mechanism, the video’s first segment is stored on a server of a stationary proxy type. The delayed clients will directly acquire the first segment from the proxy server instead of waiting for the following broadcasting channel pertaining to the first segment. The proposed scheme ensuresobtaining the first segment from mobile clients when they arrive. Additionally, the performance of the proposed scheme is validated by applying the VOD system, which can involve the balancing mechanism to retain particular requests through to the local proxy server to provide a fair dissemination for these requests. The obtained result confirms that the proposed scheme reduces the time delay of the system in comparison with the best existing schemes. The results of the average time delay in the Proxy-Cache scheme is 179.2505 milliseconds when 10 clients arrive each minute (Client/minute), the average time delay is 140 milliseconds when the video lengths are 30, 60 and 90. Meanwhile, the failure probability for obtaining the first segment of the video remains zero when the number of arrived requests is set to2, 4, 6, 8 and 10. 

KEYWORDS

 VOD, Proxy-Cache, All-Cache, PoR-Cache, Random-Cache, DSC-Cache, SB, LF’s, LPS.

Scalable and Energy Efficient Task Offloading Schemes for Vehicular Cloud Computing

Mohammad Pasha1 and Khaleel Ur Rahman Khan2

 1Department of Information Technology, MJCET, Hyderabad, India 2Department of Computer Science Engineering, ACE, Hyderabad, India 

ABSTRACT

 Smart vehicles of today on road are equipped with advanced computational units, multiple communication technologies, intelligent sensing platforms, and human-computer interaction devices which utilize Vehicular Edge Networks to support services offered by the remote cloud. This being named as Opportunistic Vehicular Edge Computing recently, has the possibility to supplement the services provided by the Edge gadgets. Many Vehicular Edge Computing architectures have been proposed as of late which support task offloading. One among the premier difficulties in these networks is efficiently utilizing the resources available at the vehicular nodes. The present work uses APEATOVC, a conveyed and versatile protocol for economical, efficient and effective task offloading in these networks which address the adaptability of vehicular clouds. The results obtained by extensive simulations are presented to assess and contrast its performance with existing protocols. 

KEYWORDS

Vehicular Cloud Computing, Mobile Edge Computing, Vehicular Ad-Hoc Networks, Computation Offloading.




  

Improvement of False Report Detection Performance Based on Invalid Data Detection Using Neural Network in WSN

Sanghyeok Lim and Taeho Cho 

Department of Electrical and Computer Engineering, Sungkyunkwan University, Republic of Korea 

ABSTRACT

WSN consists of a number of nodes and base stations and is used for event monitoring in various fields such as war situations, forest fires, and home networks. WSN sensor nodes are placed in fields that are difficult for users to manage. It is therefore vulnerable to attackers, and attackers can use false nodes or MAC injection attacks through the hijacked nodes to reduce the lifetime of the network or trigger false alarms. In order to prevent such attacks, several security protocols have been proposed, and all of them have been subjected to MAC-dependent validation, making it impossible to defend against false report attacks in extreme attack circumstances. As attacks have recently become more diverse and more intelligent, WSNs require intelligent methods of security. Based on the report information gathered from the base station, the proposed method provides a technique to prevent attacks that may occur where all MAC information is damaged by carrying out verification of a false report attack through the machine learning based prediction model and the evaluation function. 

KEYWORDS

Network Protocols, Wireless Sensor Network, simulation, machine learning, neural network

Wednesday, December 5, 2018

Performance of OLSR MANET Adopting Cross-Layer Approach Under CBR and VBR Traffics Environment

Teerapat Sanguankotchakorn1 , Sanika K.Wijayasekara2 and Sugino Nobuhiko3 

1Telecommunications Field of Study, School of Engineering and Technology, Asian Institute of technology, Pathumthani, Thailand 2 Faculty of Engineering, Chulalongkorn University, Bangkok, Thailand 3 Interdisciplinary Graduate School of Science and Engineering, Tokyo Institute of Technology, Japan 

ABSTRACT

 The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET. The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS guarantee and improve the power consumption. The performances of the proposed scheme are investigated by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load. 

KEYWORDS

Mobile Ad-hoc Network (MANET), OLSR, Bit Error Rate (BER), Weighted Connectivity Index, Quality of Service (QoS)