Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied ...for IoT traffic identification in IoT risk management. However, due to inaccurate feature selection, ML techniques misclassify a number of malicious traffic in smart IoT network for secured smart applications. To address the problem, it is very important to select features set that carry enough information for accurate smart IoT anomaly and intrusion traffic identification. In this paper, we firstly applied bijective soft set for effective feature selection to select effective features, and then we proposed a novel CorrACC feature selection metric approach. Afterward, we designed and developed a new feature selection algorithm named Corracc based on CorrACC, which is based on wrapper technique to filter the features and select effective feature for a particular ML classifier by using ACC metric. For the evaluation our proposed approaches, we used four different ML classifiers on the BoT-IoT dataset. Experimental results obtained by our algorithms are promising and can achieve more than 95% accuracy.
In order to meet the requirements of massively connected devices, different quality of services (QoS), various transmit rates, and ultra-reliable and low latency communications (URLLC) in ...vehicle-to-everything (V2X) communications, we introduce a full duplex non-orthogonal multiple access (FD-NOMA)-based decentralized V2X system model. We, then, classify the V2X communications into two scenarios and give their exact capacity expressions. To solve the computation complicated problems of the involved exponential integral functions, we give the approximate closed-form expressions with arbitrary small errors. Numerical results indicate the validness of our derivations. Our analysis has that the accuracy of our approximate expressions is controlled by the division of <inline-formula> <tex-math notation="LaTeX">\frac {\pi }{2} </tex-math></inline-formula> in the urban and crowded scenarios, and the truncation point <inline-formula> <tex-math notation="LaTeX">{T} </tex-math></inline-formula> in the suburban and remote scenarios. Numerical results manifest that: 1) increasing the number of V2X device, NOMA power, and Rician factor value yields a better capacity performance; 2) effect of FD-NOMA is determined by the FD self-interference and the channel noise; and 3) FD-NOMA has a better latency performance compared with other schemes.
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this ...purpose, numerous machine-learning (ML) technique models are presented by many researchers to block malicious traffic flows in the IoT network. However, due to the inappropriate feature selection, several ML models prone misclassify mostly malicious traffic flows. Nevertheless, the significant problem still needs to be studied more in-depth that is how to select effective features for accurate malicious traffic detection in the IoT network. To address the problem, a new framework model is proposed. First, a novel feature selection metric approach named CorrAUC is proposed, and then based on CorrAUC, a new feature selection algorithm named CorrAUC is developed and designed, which is based on the wrapper technique to filter the features accurately and select effective features for the selected ML algorithm by using the area under the curve (AUC) metric. Then, we applied the integrated TOPSIS and Shannon entropy based on a bijective soft set to validate selected features for malicious traffic identification in the IoT network. We evaluate our proposed approach by using the Bot-IoT data set and four different ML algorithms. The experimental results analysis showed that our proposed method is efficient and can achieve >96% results on average.
To improve the quality of service (QoS) needed by several applications areas, the Internet of Things (IoT) tasks are offloaded into the fog computing instead of the cloud. However, the availability ...of ongoing energy heads for fog computing servers is one of the constraints for IoT applications because transmitting the huge quantity of the data generated using IoT devices will produce network bandwidth overhead and slow down the responsive time of the statements analyzed. In this article, an energy-aware model basis on the marine predators algorithm (MPA) is proposed for tackling the task scheduling in fog computing (TSFC) to improve the QoSs required by users. In addition to the standard MPA, we proposed the other two versions. The first version is called modified MPA (MMPA), which will modify MPA to improve their exploitation capability by using the last updated positions instead of the last best one. The second one will improve MMPA by the ranking strategy based reinitialization and mutation toward the best, in addition to reinitializing, the half population randomly after a predefined number of iterations to get rid of local optima and mutated the last half toward the best-so-far solution. Accordingly, MPA is proposed to solve the continuous one, whereas the TSFC is considered a discrete one, so the normalization and scaling phase will be used to convert the standard MPA into a discrete one. The three versions are proposed with some other metaheuristic algorithms and genetic algorithms based on various performance metrics such as energy consumption, makespan, flow time, and carbon dioxide emission rate. The improved MMPA could outperform all the other algorithms and the other two versions.
Nowadays, rumor spreading has gradually evolved into a kind of organized behaviors, accompanied with strong uncertainty and fuzziness. However, existing fuzzy detection techniques for rumors focused ...their attention on supervised scenarios that require expert samples with labels for training. Thus, they are not able to well handle the unsupervised scenarios where labels are unavailable. To bridge such gap, this article proposed a fuzzy detection system for rumors through explainable adaptive learning. Specifically, its core is a graph embedding-based generative adversarial network (Graph-GAN) model. First of all, it constructs fine-grained feature spaces via graph-level encoding. Furthermore, it introduces continuous adversarial training between a generator and a discriminator for unsupervised decoding. The two-stage scheme not only solves the fuzzy rumor detection under unsupervised scenarios, but also improves robustness of the unsupervised training. Empirically, a set of experiments are carried out based on three real-world datasets. Compared with seven benchmark methods in terms of four metrics, the results of the Graph-GAN reveal a proper performance, which averagely exceeds baselines by 5-10%.
Graph neural network combined with reinforcement learning is one of the most effective traffic signal control methods. However, existing methods fail to pay enough attention to the key information, ...such as the traffic information of the downstream section in extracting state and the intersection's own state in aggregating information from neighbor intersections. As a result, adverse reactions like unstable learning and limited performance occur frequently when agents and models focus on interfering information and useless information too much. In this article, we propose KeyLight, an intelligent traffic signal control method based on reinforcement learning by facilitating the attention of the learning algorithm and model to the key information that is usually ignored. In KeyLight, we design a new state representation NOV-LADLE and introduce residual connection in the graph neural network to highlight the importance of the intersection's state. Experiments show that, in the case of comparable throughput, the proposed KeyLight has been greatly improved and enhanced in performance. Especially, the average travel time can be increased by up to 23.44% on the real-world dataset.
The drone's open and untrusted environment may create problems for authentication and data sharing. To address this issue, we propose a blockchain-enabled efficient and secure data sharing model for ...5G flying drones. In this model, blockchain and attribute-based encryption (ABE) are applied to ensure the security of instruction issues and data sharing. The authentication mechanism in the model employs a smart contract for authentication and access control, public key cryptography for providing accounts and ensuring accounts' security, and a distributed ledger for security audit. In addition, to speed up out-sourced computations and reduce electricity consumption, an ABE model with parallel outsourced computation (ABEM-POC) is constructed, and a generic parallel computation method for ABE is proposed. The analysis of the experimental results shows that parallel computation significantly improves the speed of outsourced encryption and decryption compared to serial computation.
Summary
Recently Internet of Things (IoT) is being used in several fields like smart city, agriculture, weather forecasting, smart grids, waste management, etc. Even though IoT has huge potential in ...several applications, there are some areas for improvement. In the current work, we have concentrated on minimizing the energy consumption of sensors in the IoT network that will lead to an increase in the network lifetime. In this work, to optimize the energy consumption, most appropriate Cluster Head (CH) is chosen in the IoT network. The proposed work makes use of a hybrid metaheuristic algorithm, namely, Whale Optimization Algorithm (WOA) with Simulated Annealing (SA). To select the optimal CH in the clusters of IoT network, several performance metrics such as the number of alive nodes, load, temperature, residual energy, cost function have been used. The proposed approach is then compared with several state‐of‐the‐art optimization algorithms like Artificial Bee Colony algorithm, Genetic Algorithm, Adaptive Gravitational Search algorithm, WOA. The results prove the superiority of the proposed hybrid approach over existing approaches.
•This paper study Data Mining and Machine Learning Methods for Sustainable Smart Cities Traffic Classification: A Survey.•This survey paper describes the significant literature survey of Sustainable ...Smart Cities (SSC), Machine Learning (ML), Data Mining (DM), datasets, feature extraction and selection for network traffic classification.•In this paper, most cited methods and datasets of features were identified, read and summarized.•In this paper, different classification techniques for SSC network traffic classification are presented.•In this paper, in the end, challenges and recommendations for SSC network traffic classification with the dataset of features are presented.
This survey paper describes the significant literature survey of Sustainable Smart Cities (SSC), Machine Learning (ML), Data Mining (DM), datasets, feature extraction and selection for network traffic classification. Considering relevance and most cited methods and datasets of features were identified, read and summarized. As data and data features are essential in Internet traffic classification using machine learning techniques, some well-known and most used datasets with details statistical features are described. Different classification techniques for SSC network traffic classification are presented with more information. The complexity of data set, features extraction and machine learning methods are addressed. In the end, challenges and recommendations for SSC network traffic classification with the dataset of features are presented.
Classification of imbalanced data is a vastly explored issue of the last and present decade and still keeps the same importance because data are an essential term today and it becomes crucial when ...data are distributed into several classes. The term imbalance refers to uneven distribution of data into classes that severely affects the performance of traditional classifiers, that is, classifiers become biased toward the class having larger amount of data. The data generated from wireless sensor networks will have several imbalances. This review article is a decent analysis of imbalance issue for wireless sensor networks and other application domains, which will help the community to understand WHAT, WHY, and WHEN of imbalance in data and its remedies.