Umesh K. Raut and L.K. Vishwamitra
Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource…
Abstract
Purpose
Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource allocation strategy is focused on which the seek-and-destroy algorithm is implemented in the controller in such a way that an effective allocation of the resources is done based on the multi-objective function.
Design/methodology/approach
The purpose of this study is focuses on the resource allocation algorithm for the SDVN with the security analysis to analyse the effect of the attacks in the network. The genuine nodes in the network are granted access to the communication in the network, for which the factors such as trust, throughput, delay and packet delivery ratio are used and the algorithm used is Seek-and-Destroy optimization. Moreover, the optimal resource allocation is done using the same optimization in such a way that the network lifetime is extended.
Findings
The security analysis is undergoing in the research using the simulation of the attackers such as selective forwarding attacks, replay attacks, Sybil attacks and wormhole attacks that reveal that the replay attacks and the Sybil attacks are dangerous attacks and in future, there is a requirement for the security model, which ensures the protection against these attacks such that the network lifetime is extended for a prolonged communication. The achievement of the proposed method in the absence of the attacks is 84.8513% for the remaining nodal energy, 95.0535% for packet delivery ratio (PDR), 279.258 ms for transmission delay and 28.9572 kbps for throughput.
Originality/value
The seek-and-destroy algorithm is one of the swarm intelligence-based optimization designed based on the characteristics of the scroungers and defenders, which is completely novel in the area of optimizations. The diversification and intensification of the algorithm are perfectly balanced, leading to good convergence rates.
Details
Keywords
Jyothi N. and Rekha Patil
This study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.
Abstract
Purpose
This study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.
Design/methodology/approach
The authors built a deep learning-based optimized trust mechanism that removes malicious content generated by selfish VANET nodes. This deep learning-based optimized trust framework is the combination of the Deep Belief Network-based Red Fox Optimization algorithm. A novel deep learning-based optimized model is developed to identify the type of vehicle in the non-line of sight (nLoS) condition. This authentication scheme satisfies both the security and privacy goals of the VANET environment. The message authenticity and integrity are verified using the vehicle location to determine the trust level. The location is verified via distance and time. It identifies whether the sender is in its actual location based on the time and distance.
Findings
A deep learning-based optimized Trust model is used to detect the obstacles that are present in both the line of sight and nLoS conditions to reduce the accident rate. While compared to the previous methods, the experimental results outperform better prediction results in terms of accuracy, precision, recall, computational cost and communication overhead.
Practical implications
The experiments are conducted using the Network Simulator Version 2 simulator and evaluated using different performance metrics including computational cost, accuracy, precision, recall and communication overhead with simple attack and opinion tampering attack. However, the proposed method provided better prediction results in terms of computational cost, accuracy, precision, recall, and communication overhead than other existing methods, such as K-nearest neighbor and Artificial Neural Network. Hence, the proposed method highly against the simple attack and opinion tampering attacks.
Originality/value
This paper proposed a deep learning-based optimized Trust framework for trust prediction in VANET. A deep learning-based optimized Trust model is used to evaluate both event message senders and event message integrity and accuracy.
Details
Keywords
Anshu Prakash Murdan and Vishwamitra Oree
In this chapter, we investigate the role of the Internet of Things (IoT) for a more sustainable future. The IoT is an umbrella term that refers to an interrelated network of…
Abstract
In this chapter, we investigate the role of the Internet of Things (IoT) for a more sustainable future. The IoT is an umbrella term that refers to an interrelated network of devices connected to the internet. It also encompasses the technology that enables communication between these devices as well as between the devices and the cloud. The emergence of low-cost microprocessors, sensors and actuators, as well as access to high bandwidth internet connectivity, has led to the massive adoption of IoT systems in everyday life. IoT systems include connected vehicles, connected homes, smart cities, smart buildings, precision agriculture, among others. During the last decade, they have been impacting human activities in an unprecedented way. In essence, IoT technology contributes to the improvement of citizens' quality of life and companies' competitiveness. In doing so, IoT is also contributing to achieve the Sustainable Development Goals (SDGs) that were adopted by the United Nations in 2015 as an urgent call to action by all countries to eradicate poverty, tackle climate change and ensure that no one is left behind by 2030. The World Economic Forum (WEF) recognises that IoT is undeniably one of the major facilitators for responsible digital transformation, and one of its reports revealed that 84% of IoT deployments are presently addressing, or can potentially address the SDGs. IoT is closely interlinked with other emerging technologies such as Artificial Intelligence (AI) and Cloud Computing, for the delivery of enhanced and value-added services. In recent years, there has been a push from the IoT research and industry community together with international stakeholders, for supporting the deployment and adoption of IoT and AI technologies to overcome some of the major challenges facing mankind in terms of protecting the environment, fostering sustainable development, improving safety and enhancing the agriculture supply chain, among others.
Details
Keywords
This chapter examines how the pandemic altered exposure to online hate. We investigate if the pandemic affected previously observed patterns of exposure to online hate in Finland…
Abstract
This chapter examines how the pandemic altered exposure to online hate. We investigate if the pandemic affected previously observed patterns of exposure to online hate in Finland and the United States. We ask, did online hate become more prevalent as the pandemic unfolded and became increasingly politicized? It is important to consider online hate exposure in the early stages of the pandemic because the pandemic fanned the flames of hate. This increase in hate can then lead to fewer people complying with recommended health-protective behaviors and increases in hate crimes, which would increase the overall toll of the pandemic. Thus, this chapter explores if the landscape of online hate in the United States and Finland changed in the initial stages of COVID-19. Initially, rates of exposure were higher in Finland than in the United States, and, as predicted, rates of exposure increased between April and November 2020. However, this increase was observed only in the United States. The increase in exposure in the United States combined with the stability in exposure in Finland resulted in the country differences that were observed in April disappearing by November. The chapter concludes by exploring the likely role of the political leaders of the two nations played in this pattern of online hate exposure. Specifically, President Trump’s use of racialized descriptions of the pandemic are contrast to Prime Minister Marion’s more scientific descriptions to demonstrate how policy rhetoric can encourage or discourage online hate.
Details
Keywords
Yogendra Shastri, Urmila Diwekar and Sanjay Mehrotra
This work proposes an innovative approach of watershed level mercury trading for sustainable management of mercury pollution. An optimization based decision-making framework has…
Abstract
This work proposes an innovative approach of watershed level mercury trading for sustainable management of mercury pollution. An optimization based decision-making framework has been developed to optimize the selection of mercury treatment technologies by industries in a watershed in the presence of nonlinearity and uncertainty in technology cost models. The impact of the regulation on technology selection by industries, often ignored in existing trading literature, has been quantified. A particularly novel contribution of this framework is the consideration of health care cost as an objective. The application of the framework to the Savannah River watershed case study in US emphasizes the importance of health care cost while evaluating the benefits of trading. Nonlinearity and uncertainty in the cost models is shown to significantly affect technology selection. The ecological perspective of innovation comes from the proposal of using water body liming to mitigate mercury bioaccumulation and concerns of mercury hotspots.
Subbaraju Pericherla and E. Ilavarasan
Nowadays people are connected by social media like Facebook, Instagram, Twitter, YouTube and much more. Bullies take advantage of these social networks to share their comments…
Abstract
Purpose
Nowadays people are connected by social media like Facebook, Instagram, Twitter, YouTube and much more. Bullies take advantage of these social networks to share their comments. Cyberbullying is one typical kind of harassment by making aggressive comments, abuses to hurt the netizens. Social media is one of the areas where bullying happens extensively. Hence, it is necessary to develop an efficient and autonomous cyberbullying detection technique.
Design/methodology/approach
In this paper, the authors proposed a transformer network-based word embeddings approach for cyberbullying detection. RoBERTa is used to generate word embeddings and Light Gradient Boosting Machine is used as a classifier.
Findings
The proposed approach outperforms machine learning algorithms such as logistic regression, support vector machine and deep learning models such as word-level convolutional neural networks (word CNN) and character convolutional neural networks with short cuts (char CNNS) in terms of precision, recall, F1-score.
Originality/value
One of the limitations of traditional word embeddings methods is context-independent. In this work, only text data are utilized to identify cyberbullying. This work can be extended to predict cyberbullying activities in multimedia environment like image, audio and video.