Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installation DOI Creative Commons
Mudassar Hussain, Rashid Amin, Rahma Gantassi

и другие.

Scientific Reports, Год журнала: 2024, Номер 14(1)

Опубликована: Июнь 28, 2024

Software-defined networking (SDN) is a pioneering network paradigm that strategically decouples the control plane from data and management planes, thereby streamlining administration. SDN's centralized makes configuring access list (ACL) policies easier, which important as these frequently change due to application needs topology modifications. Consequently, this action may trigger modifications at SDN controller. In response, controller performs computational tasks generate updated flow rules in accordance with modified ACL installs plane. Existing research has investigated reactive installation changes result packet violations inefficiencies. Network becomes difficult deleting inconsistent computing new per policies. The proposed solution efficiently handles policy phenomena by automatically detecting accordingly along caching adding A comprehensive analysis of both proactive mechanisms carried out achieve this. To facilitate evaluation mechanisms, are modeled using 5-tuple structure comprising Source, Destination, Protocol, Ports, Action. resulting then translated into implementation file transmitted Subsequently, utilizes calculate necessary caches hash table addition installing them switches. simulated Mininet Emulator set policies, hosts, results presented varying different time instances, inter-packet delay timeout value. simulation show rule better than mechanism respect throughput, violations, successful delivery, normalized overhead, detection end-to-end delay. solution, designed be directly used on controllers support Pyretic language, provides flexible efficient approach for installation. can employed administrators implementing It also integrated monitoring debugging tools analyze effectiveness mechanism.

Язык: Английский

A review on artificial intelligence thermal fluids and the integration of energy conservation with blockchain technology DOI Creative Commons
Abdullah Ayub Khan, Asif Ali Laghari, A. K. M. Sarwar Inam

и другие.

Discover Sustainability, Год журнала: 2025, Номер 6(1)

Опубликована: Апрель 10, 2025

Язык: Английский

Процитировано

0

Fully Anonymous Decentralized Identity Supporting Threshold Traceability with Practical Blockchain DOI
Yizhong Liu,

Zedan Zhao,

Boyu Zhao

и другие.

Опубликована: Апрель 22, 2025

Язык: Английский

Процитировано

0

A Two-branch Edge Guided Lightweight Network for infrared image saliency detection DOI Creative Commons

Zhaoying Liu,

Xiang Li, Ting Zhang

и другие.

Computers & Electrical Engineering, Год журнала: 2024, Номер 118, С. 109296 - 109296

Опубликована: Май 28, 2024

In the dynamic landscape of saliency detection, convolutional neural networks have emerged as catalysts for innovation, but remain largely tailored RGB imagery, falling short in context infrared images, particularly memory-restricted environments. These existing approaches tend to overlook wealth contour information vital a nuanced analysis images. Addressing this notable gap, we introduce novel Two-branch Edge Guided Lightweight Network (TBENet), designed explicitly robust image detection. The main contributions paper are follows. First, formulate detection task two subtasks, enhancement and foreground segmentation. Therefore, TBENet is divided into specialized branches: prediction branch extracting target map generation separating from background. first employs an encoder–decoder architecture meticulously delineate object contours, serving guiding blueprint second branch. This latter segment adeptly integrates spatial semantic data, creating precise that refined further by innovative edge-weighted loss function. Second, enhance feature integration capabilities, propose depthwise multi-scale multi-cue modules, facilitating sophisticated aggregation. Third, high-level linear bottleneck module devised ensure extraction rich information, replacing standard convolution with convolution, it beneficial reduce model complexity. Additional, number channels maps each stage decoder lightweight model. Last, construct ship dataset Small-IRShip train evaluate our proposed Experimental results on homemade publicly available datasets, namely RGB-T IRSTD-1k, demonstrate TBENet's superior performance over state-of-the-art methods, affirming its effectiveness harnessing edge incorporating advanced strategies.

Язык: Английский

Процитировано

3

Adaptive solutions for metaverse urban mobility through decision-making and blockchain DOI Creative Commons
Shuchen Zhou, Lei Yu,

Yinling Wang

и другие.

Alexandria Engineering Journal, Год журнала: 2024, Номер 107, С. 1 - 14

Опубликована: Июль 16, 2024

Язык: Английский

Процитировано

3

TCDT: A trust-enabled crowdsourced data trading system in intelligent blockchain over Internet of Things DOI
Ting Li,

Anfeng Liu,

Shaobo Zhang

и другие.

Expert Systems with Applications, Год журнала: 2024, Номер 265, С. 125968 - 125968

Опубликована: Дек. 6, 2024

Язык: Английский

Процитировано

3

Third layer blockchains are being rapidly developed: Addressing state-of-the-art paradigms and future horizons DOI
Saeed Banaeian Far, Seyed Mojtaba Hosseini Bamakan

Journal of Network and Computer Applications, Год журнала: 2024, Номер unknown, С. 104044 - 104044

Опубликована: Окт. 1, 2024

Язык: Английский

Процитировано

2

Advancing Sustainable Urban Development: Navigating Complexity with Spherical Fuzzy Decision Making DOI Open Access
Mohd Anjum, Hong Min, Gaurav Sharma

и другие.

Symmetry, Год журнала: 2024, Номер 16(6), С. 670 - 670

Опубликована: Май 29, 2024

This study explores the complexities of urban planning and addresses major issues by carefully weighing four options for smart city technology, community-based development, green infrastructure investment, transit-oriented development. Unlike traditional evaluations, our applies novel SWARA-WASPAS model to spherical fuzzy sets (SFSs), thus identifying navigating uncertainty present in decision making. methodological approach improves accuracy assessment providing detailed information about advantages disadvantages each option. Our offers useful insights policymakers planners using weighted criteria employing a methodical ranking procedure. The aim is provide decisions that promote equity, environmental consciousness, resilience, symmetry environments. application not only advances field but also provides strong basis informed evaluations into option’s pros cons. uses systematic advise planners. main goal help populations make resilient, environmentally responsible, equitable, symmetrical decisions. research aims further conversation on sustainable development offering framework based data difficulties associated with dynamic In end, we want humanized viewpoint speak wider audience inspire shared dedication creating cities flourish face changing

Язык: Английский

Процитировано

2

Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things DOI Creative Commons

Ali Mohammad Norouzzadeh Gilmolk,

Mohammad Reza Aref

International Journal of Computational Intelligence Systems, Год журнала: 2024, Номер 17(1)

Опубликована: Июнь 13, 2024

Abstract Recently, the field of lightweight cryptography (LWC) has emerged in response to security needs low-cost, widely used technology. It is essential implement an encryption approach with access control give less complex, more flexible, and safe sensitive data. In this work, a novel chaotic fuzzy presented encrypt light images IoT domain, while maintaining image quality. With aid multiplexer modeling information shift register technology, algorithm’s design combines random mapping based on specific password key predetermined number logic shifts for pixels. Further, extract private complexity boost defense against attacks, logical xor combination employed. The simulation proposed model AVR microcontroller been done under MATLAB software various components mapping. system evaluated terms histogram analysis, adjacent pixel correlation contrast homogeneity energy NIST error mean square entropy, change rate, integrated intensity, peak signal-to-noise ratio, time complexity. Remarkably, technique demonstrated high efficiency. results show that homogeneity, energy, contrast, NPCR, UACI criteria have improved by 11.5%, 13.1%, 19%, 0.53%, 0.12%, respectively, compared other methods articles.

Язык: Английский

Процитировано

2

A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks DOI Creative Commons
Hakan Aydın, Sedat Görmüş, Burak Aydın

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 90952 - 90970

Опубликована: Янв. 1, 2024

Many Industrial Internet of Things (IIoT) applications require wireless networks with low power consumption, latency, and secure communication. The IPv6 over the TSCH mode IEEE 802.15.4e (IETF 6TiSCH) standard has been created to fulfill these requirements provide reliable efficient communication, specifically in industrial environments. A authentication process is first step towards ensuring privacy security a IoT network. IETF Constrained Join Protocol (CoJP) centralized protocol developed by 6TiSCH Working Group which used manage node bootstrapping processes through entity named as Registrar/Coordinator (JRC). This requires joining nodes be authenticated via JRC entity. Centralized within exhibits scalability limitations beyond small-to-medium deployments, necessitating alternative approaches for requiring large number deployed nodes. Using distributed approach where role among network can help mitigate this drawback. In paper, placement method decentralized introduced address challenges heuristic solution that optimise Proxy-JRC proposed. Experimental results 2,3 4 placed proposed show up 25% improvement terms key update time 22% consumption. These highlight benefits employing mechanism meet communication large-scale networks.

Язык: Английский

Процитировано

2

DemocracyGuard: Blockchain‐based secure voting framework for digital democracy DOI Creative Commons
Mritunjay Shall Peelam,

Gaurav Kumar,

Kunjan Shah

и другие.

Expert Systems, Год журнала: 2024, Номер unknown

Опубликована: Авг. 13, 2024

Abstract Online voting is gaining traction in contemporary society to reduce costs and boost voter turnout, allowing individuals cast their ballots from anywhere with an internet connection. This innovation cautiously met due the inherent security risks, where a single vulnerability can lead widespread vote manipulation. Blockchain technology has emerged as promising solution address these concerns create trustworthy electoral process. offers decentralized network of nodes that enhances transparency, security, verifiability. Its distributed ledger non‐repudiation features make it compelling alternative traditional electronic systems, ensuring integrity elections. To further bolster online voting, we propose DemocracyGuard platform on Ethereum blockchain, which incorporates facial recognition authenticate voters. By leveraging advancements, aims provide secure resilient for paving way its broader adoption revolutionizing landscape.

Язык: Английский

Процитировано

1