One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Report
Share
Report
Share
1 of 15
Download to read offline
More Related Content
Similar to A new algorithm to enhance security against cyber threats for internet of things application
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
Internet of things (IoT) is a concept that has been widely used to improve business efficiency and customer’s experience. It involves resource constrained devices connecting to each other with a capability of sending data, and some with receiving data at the same time. The IoT environment enhances user experience by giving room to a large number of smart devices to connect and share information. However, with the sophistication of technology has resulted in IoT applications facing with malware threat. Therefore, it becomes highly imperative to give an understanding of existing state-of-the-art techniques developed to address malware threat in IoT applications. In this paper, we studied extensively the adoption of static, dynamic and hybrid malware analyses in proffering solution to the security problems plaguing different IoT applications. The success of the reviewed analysis techniques were observed through case studies from smart homes, smart factories, smart gadgets and IoT application protocols. This study gives a better understanding of the holistic approaches to malware threats in IoT applications and the way forward for strengthening the protection defense in IoT applications.
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
This document discusses software defined networking (SDN) and its potential to enhance security and empower the internet of things (IoT). It begins with an overview of SDN architecture and how it decouples the control plane from the data plane, allowing for centralized programmable control. This is seen as an improvement over traditional networking architectures which are not scalable and make configuration difficult. The document then reviews literature on using SDN to prevent attacks on IoT networks, provide visibility and control of traffic flows, and leverage SDN features to benefit security. In conclusion, SDN is presented as a promising approach for managing complex IoT environments and adapting dynamically to changing needs.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
A signature-based data security and authentication framework for internet of...IJECEIAES
This document presents a research paper that proposes a signature-based data security and authentication framework for Internet of Things (IoT) applications. The paper introduces a novel computational model that establishes a unique authentication process using a simplified encryption strategy. The model considers both local and global IoT environments and implements an authentication mechanism using challenge-response exchanges between communicating nodes. A digital signature is generated using parameters like random seeds, secret keys, prime values, and data packets. Simulation results show that the proposed system offers efficient security and data transmission performance in the presence of unknown adversaries, performing better than commonly used security solutions in vulnerable IoT environments.
A review on machine learning based intrusion detection system for internet of...IJECEIAES
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gather the abundant amount of data that is being generated and then transmit this data to the predetermined server over the internet. IoT connects billions of objects and the internet to communicate without human intervention. But network security and privacy issues are increasing very fast, in today's world. Because of the prevalence of technological advancement in regular activities, internet security has evolved into a necessary requirement. Because technology is integrated into every aspect of contemporary life, cyberattacks on the internet of things represent a bigger danger than attacks against traditional networks. Researchers have found that combining machine learning techniques into an intrusion detection system (IDS) is an efficient way to get beyond the limitations of conventional IDSs in an IoT context. This research presents a comprehensive literature assessment and develops an intrusion detection system that makes use of machine learning techniques to address security problems in an IoT environment. Along with a comprehensive look at the state of the art in terms of intrusion detection systems for IoT-enabled environments, this study also examines the attributes of approaches, common datasets, and existing methods utilized to construct such systems.
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power
network and communication network, enabling full perception of the system status and business operations
for power production, transmission, and consumption. To address the challenges of real-time perception,
rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology.
Edge computing is a new and innovative computing architecture that enables quick and efficient
processing of data close to the source, bypassing network latency and bandwidth issues. By shifting
computing power to the edge of the network, edge computing reduces the strain on cloud computing
centers and decreases input response time for users. However, access latency can still be a bottleneck,
which may overshadow the benefits of edge computing, particularly for data-intensive services. While edge
computing offers promising solutions for the IoT network, there are still some issues to address, such as
security, incomplete data, and investment and maintenance costs. In this paper, researcher conducts a
comprehensive survey of edge computing and how edge device placement can improve performance in IoT
networks. The paper includes a comparative use case of smart agriculture edge computing
implementations and discusses the various challenges faced in implementing edge computing in the UPIoT
context. The results also aim to inspire new edge-based IoT security designs by providing a complete
review of IoT security solutions at the edge layer in UPIoT
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
This document discusses lightweight cryptography algorithms for security in Internet of Things (IoT) devices. It provides an overview of IoT architecture and applications. It then discusses the need for lightweight cryptography due to constraints of IoT devices. Various lightweight cryptography algorithms are described, including symmetric key and asymmetric key algorithms. Challenges of lightweight cryptography are also outlined. Related work studying lightweight cryptography algorithms for IoT security is reviewed. The document analyzes and compares various lightweight cryptography algorithms suitable for securing resource-constrained IoT devices.
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
This document discusses security challenges with Internet of Things (IoT) devices and potential solutions. It first describes how the widespread use of IoT devices has introduced new security issues as hackers can easily access information without proper security measures. The document then reviews 10 different papers on techniques used to enhance security for IoT devices, including security models, access mechanisms, encryption, authentication, and more. It evaluates various technologies like RFID, sensors, artificial intelligence. Finally, the document concludes that providing a security-enabled model to secure end-to-end communication is the best short-term solution, while various approaches are needed to address different security issues in IoT.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
This document discusses cryptography and security implementations for Internet of Things (IoT) devices. It begins with an introduction to IoT and the need for security protocols as IoT devices collect and transmit large amounts of sensitive data. Challenges to IoT security include the diversity of devices which makes vulnerabilities complex, and limited computational resources. The document then explores using symmetric and public key cryptography algorithms as well as proposed lightweight cryptography solutions for IoT security. It concludes that while traditional security solutions are inadequate, lightweight cryptography protocols have the potential to help secure IoT communications and address current challenges if standardized for diverse IoT hardware.
Authentication Devices in Fog-mobile Edge Computing Environments through a Wi...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing and wireless grids has resulted in the
wide spread deployment of relatively immature technology. These technologies, which will primarily use 5G wireless communication networks, are becoming popular because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected by a robust security architecture due to these technologies being plagued with security problems. The authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new information system platforms. This article identifies an authentication process required for these ICDs, which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The proposed
methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and mobile edge computing clouds to create this new IoT architecture. An authentication process developed from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] andpresence, permissions
management, data transferability, application-programming interface [API] and security.
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the methods of information security and coding are important as the security approaches that rely heavily on coding are not a strong match for these restricted devices. Consequently, this research aims to contribute to filling this gap, which adopts machine learning techniques to enhance network-level security in the low-power devices that use the lightweight MQTT protocol for their work. This study used a set of tools tools and, through various techniques, trained the proposed system ranging from Ensemble methods to deep learning models. The system has come to know what type of attack has occurred, which helps protect IoT devices. The log loss of the Ensemble methods is 0.44, and the accuracy of multi-class classification is 98.72% after converting the table data into an image set. The work also uses a Convolution Neural Network, which has a log loss of 0.019 and an accuracy of 99.3%. It also aims to implement these functions in IDS.
Cyber Security Challenges on Latest TechnologiesIRJET Journal
This document discusses cyber security challenges posed by latest technologies. It notes that as new technologies like cloud computing and mobile networks have been adopted, cyber crimes have also increased exponentially. The document outlines some key trends changing cyber security like increased use of web servers by cyber criminals, security issues with cloud services, new types of advanced persistent threats, security risks of mobile networks, challenges of the new IPv6 internet protocol, and importance of encryption. Overall it examines the current state of cyber security and risks posed by emerging technologies.
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
This document summarizes cyber security threats and vulnerabilities in the Internet of Things (IoT). It discusses how the growth of interconnected devices in IoT introduces new cyber security risks. Various types of attacks that threaten IoT systems are described, such as device attacks, network attacks, and denial of service attacks. The document also examines specific vulnerabilities in IoT protocols, firmware, and applications that can enable these attacks. Finally, some potential countermeasures for improving IoT security are mentioned, like implementing secure boot processes, mutual authentication between devices, and end-to-end encryption of communications.
A Review On Intrusion Detection Systems To Secure IoT NetworksAnna Landers
This document reviews intrusion detection systems (IDS) for securing Internet of Things (IoT) networks. It discusses the need for IDS in IoT given issues like increasing number of connected devices and resource constraints. The paper analyzes different types of attacks on IoT including on topology, resources, and traffic. It examines various IDS approaches for IoT based on placement strategy and technologies. Challenges of implementing lightweight IDS for resource-limited IoT are identified along with needs for further research on improving IDS security for IoT networks and devices.
This document discusses the definition, characteristics, architecture, enabling technologies, applications and future challenges of the Internet of Things (IoT). It provides definitions of IoT, describing it as a network that connects physical objects through sensors and allows them to communicate and share data. It outlines the key enabling technologies that make IoT applications possible, such as wireless technologies, microcontrollers, cloud computing and wireless sensor networks. It also discusses some common applications of IoT and future challenges in areas like scalability, interoperability and security.
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
AUTHENTICATING DEVICES IN FOG-MOBILE EDGE COMPUTING ENVIRONMENTS THROUGH A WI...ijujournal
The rapid growth of the Internet of Things (IoT), cloud computing, Fog computing, mobile edge computing
and wireless grids has resulted in the widespread deployment of relatively immature technology. These
technologies, which will primarily use 5G wireless communication networks, are becoming popular
because they can be deployed quickly with little infrastructure and lends themselves to environments
utilizing numerous internet connected devices (ICD). There are, however, many significant challenges
faced by security designers, engineers and implementers of these networks in ensuring that the level of
security afforded is appropriate. Because of the threat of exploitation, these networks have to be protected
by a robust security architecture due to these technologies being plagued with security problems. The
authentication of smart ICDs to IoT networks is a critical mechanism for achieving security on these new
information system platforms. This article identifies an authentication process required for these ICDs,
which will need to prove their identity to authenticate to an IoT fog-mobile edge computing (FMEC) cloud
network through a wireless grid authentication process. The purpose of this article is to begin to
hypothesize a generic authentication methodology for these FMEC clouds uses in an IoT architecture. The
proposed methodology, called wg-IoT, must include the integration of Fog computing, wireless grids and
mobile edge computing clouds to create this new IoT architecture. An authentication process developed
from the resource sharing protocol (RSP) from a wireless grid is first developed and proposed for the
authentication of ICDs. The wireless grid core components must be embedded in IoT devices or sensors
depending on their capability to handle five primary functions: management of identification [ID] and
presence, permissions management, data transferability, application-programming interface [API] and
security.
Similar to A new algorithm to enhance security against cyber threats for internet of things application (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
A new algorithm to enhance security against cyber threats for internet of things application
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 4, August 2023, pp. 4452∼4466
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i4.pp4452-4466 ❒ 4452
A new algorithm to enhance security against cyber threats
for internet of things application
Radwan S. Abujassar1
, Mohamed Sayed1
, Husam Yaseen2
1Faculty of Computer Studies, Arab Open University, Al-Ardiya, Kuwait
2School of Business and Finance, American University of Madaba, Amman, Jordan
Article Info
Article history:
Received Sep 8, 2022
Revised Dec 11, 2022
Accepted Dec 17, 2022
Keywords:
Buffer optimization
Internet of things
Quality of service
Rout attack with detection
algorithm
User data protocol
ABSTRACT
One major problem is detecting the unsuitability of traffic caused by a distributed
denial of services (DDoS) attack produced by third party nodes, such as smart
phones and other handheld Wi-Fi devices. During the transmission between the
devices, there are rising in the number of cyber attacks on systems by using
negligible packets, which lead to suspension of the services between source and
destination, and can find the vulnerabilities on the network. These vulnerable
issues have led to a reduction in the reliability of networks and a reduction in
consumer confidence. In this paper, we will introduce a new algorithm called
rout attack with detection algorithm (RAWD) to reduce the affect of any attack
by checking the packet injection, and to avoid number of cyber attacks being
received by the destination and transferred through a determined path or alter-
native path based on the problem. The proposed algorithm will forward the
real time traffic to the required destination from a new alternative backup path
which is computed by it before the attacked occurred. The results have showed
an improvement when the attack occurred and the alternative path has used to
make sure the continuity of receiving the data to the main destination without
any affection.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Radwan S. Abujassar
Faculty of Computer Studies, Arab Open University
Al-Ardiya, Kuwait
Email: r.abujassar@aou.edu.kw
1. INTRODUCTION
Currently, internet of things (IoT) is starting to spread widely across the world, which is increasing
the interconnection of physical moving data packets or “things” through the internet and from source to desti-
nation. Each end user is uniquely identified by using radio frequency identifier (RFID) tags. However, during
transmission of the data between source and destination, security should be applied to provide more confiden-
tiality and reliable networks. Now cyber security plays an essential role in all communication, as it is critical
infrastructure for all resources. Therefore, protecting the current industrial system with robust cyber security is
considered one of the most important priorities for all organizations, such as internet service provider (ISP) [1].
Various end IoT smart devices for sensing and acting, intermediary nodes with wired or wireless connectivity
for data relaying, and application servers in the cloud for data monitoring and analysis make up the conven-
tional internet of things architecture. IoT devices frequently connect with one another without much input from
end users, creating a broad and self-sufficient network. Adversaries in the cybersphere can endanger many
people’s safety and privacy in our daily lives and during communications as the line between computers and
Journal homepage: http://ijece.iaescore.com
2. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4453
users becomes blurry. Clearly, the increased usefulness of wireless communication devices has made the IoT
appealing to malicious software and digital viruses.
In order for researchers to easily create their own use cases, model IoT devices into them, and then
generate and analyze the traffic of the use case in order to develop better security solutions for IoT, the main
goal of this work is to propose a new algorithm that can reroute the traffic of an IoT generator device from
another node that has been affected by the attacker. The introduced and proposed algorithm can also be used
in huge networks with big number of nodes for testing different IoT-based network utilities like switches and
routers, by generating a large amount of IoT device traffic. Moreover, it can also be used for the designing and
testing of IoT security providing entities like intrusion detection system (IDS) and intrusion prevention system
(IPS). The key contributions of this work are as:
− We proposed an open-source framework which consists of an IoT traffic generator tool which is capable of
generating IoT normal and attack traffic over a real-time network using a single physical machine.
− We devised IoT device modelling by introducing the concept of time profile and data profile in order to
better emulate the IoT devices.
− Furthermore, we implemented a real-time traffic between source and destination nodes using the proposed
IoT traffic generation framework and demonstrated how the generated traffic can be rerouted in case of the
cyber attack.
In this paper, we will explain the models for cyber security in IoT networks. Nowadays, IoT networks
represent a promising new technology which connects all technologies together, such as smart phones, TV, CC
cameras, robotics, and so on. The IoT is starting to be implemented widely and has grown very rapidly, but it
is still facing problems with cyber security and loopholes in its networks. Therefore, people may be reluctant
to use the IoT technology in the future. One well-known problem is known as distributed denial of service
(DDoS). Such an attack can affect many IoT systems and the communications between end users using the
network [2].
The structure of the paper is organized as follows: section 2 presents a snapshot of cyber security
in the IoT and highlights the recent applications used for all new devices. In section 3, we discuss related
works on incentive programs, as well as earlier research on the internet of things and how it pertains to network
performance. In section 4 we also describe our proposed technique and compare our results with other existing
protocols. The performance of the suggested strategy is next assessed once the findings are given in section 5.
Finally, a conclusion is given and future work is discussed in section 6.
2. CYBER SECURITY IN IOT NETWORKS
Currently, the internet of things is an emerging and promising technology, which connects all network
devices around the world through the internet. IoT technology can provide improvements that assist our per-
sonal work by making our lives more professional. The IoT also comprises of a network of intelligent items
connecting to one another globally over the internet without any interference from end users. It is yet vulner-
able to cyber-attacks just like any other network. Any network can effectively identify cyberattacks using an
IDS [3]. Most of the latest IDSs are based on machine learning algorithms for the training and detecting of
cyber-attacks on the network. In addition, various smart algorithms have been proposed by many authors for
detecting the IDS and the proposed algorithm will help to detect attacks and also provide a very rapid solution
in case any nodes in the network are affected. As shown in Figure 1 a vast number of connected devices form
a network known as fog computing, which is an improved version of centralized cloud computing. Distributed
fog nodes are located closer to the IoT network objects in fog computing, which resolves the scalability bottle-
necks, high bandwidth consumption quality of service (QoS) degradation, and high latency limitations in cloud
computing [4].
A fog network is ideal for the practical implementation and success of the IoT networks. In this
paper, a fog network is one of the most important factors behind the success of our proposed algorithm and the
solution to the attack problem in a very fast mechanism. The proposed algorithm will work in the global cloud
network and can also work in cluster networks having many nodes connected to each other. The IoT network
contains many connections between different types of smart object. Hence, an attack can occur because of a big
loophole in cyber security. Typically, cyber security in the IoT concentrates on two main approaches. Firstly,
analysis leads to the discovery of policies for security. Secondly, artificial intelligence and machine learning
are employed. Both can lead to the detection of any anomalous patterns. The IoT presents a complex system
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
3. 4454 ❒ ISSN: 2088-8708
and security analysis can only be conducted in an automated and timely manner [5]. The proposed technique is
adopted to improve cyber security, including training for each node on how to detect threading in the network
or any suspicious behaviors. The main aim is not to stop the attaching, but it finds other nodes in the network
which are not affected, so that the performance of delivering any data packets can be retrained and improve the
QoS.
Figure 1. IoT attack
2.1. IoT main features
In the IoT environment, the resources of any IoT devices – such as any smart objects – are typically
limited in terms of computation, storage, memory, and power. Therefore, any new technologies that can meet
the needs of resource-constrained devices in the IoT are considered very important regarding the number of
users, which increases every day. A considerable effort has gone into researching cyber threat intelligence in the
past few years and a number of sophisticated techniques have been developed that can perform cyber security
detection. In the IoT environment, many solutions have been found that enable cyber security needs to be
more efficiently handled [6]. Broadly speaking, computational intelligence algorithms are used in IoT security
solutions, such as malware detection, cyber threat identification, suspicious behavior monitoring, intrusion
detection, and stopping cyber-attackers as it showed in Figure 2.
According to a large portion of this research, the distinctive features of the IoT make it easier to
exploit devices and spread IoT malware. The primary resources, diverse links, and fragile usability are some
of these elements. Compared to the intermediate nodes located in the networks, which connect them with the
infrastructure through wired connectivity, the IoT devices which are designed to perform sensing and actuation
operations easily have limited computation and communication capabilities. For this reason, the algorithms
and mechanisms applied on IoT devices are helping to find an urgent solution in the case of attacks occurring.
As a result, the attacker can expend far fewer resources to break into IoT devices, rendering them the targets of
malicious users [7], [8].
In order to support the many different kinds of IoT applications, devices are usually equipped with
heterogeneous communication and computation capabilities for the purpose of seamless operations. The het-
erogeneity and potentially vast amount of IoT devices facilitate the fabrication of an identity and the hiding of
malware. Moreover, as shown in Figure 3, compromised IoT all devices and might disseminate attacks via het-
erogeneous communication links [9]. Hence, IoT devices might disseminate IDS or malware via heterogeneous
communication links, as explained.
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466
4. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4455
Figure 2. IoT Environment
Figure 3. Illustration of cyber attack under patch scheme
Infrastructure links: IoT malware can propagate using infrastructure-based communication technolo-
gies, such as global system for mobile communications (GSM)/general packet radio service (GPRS)/universal
mobile telecommunication system (UMTS)/long term evolution (LTE) and wireless local area network (WLAN),
via intermediate nodes or any access points. In particular, IoT malware inherits the threats caused by any com-
puter or device malware. Similar to computer malware, most IoT malware families today scan the IP address
for vulnerable victims and then spread via the Internet between huge numbers of nodes [10]. End-to-end links:
IoT malware can use near field communication (NFC) and proximity-based wireless connection technologies
to infect nearby devices. This causes IoT malware to be stored and to start spreading by utilizing ubiquity and
mobility [11]. The last point here is called usability, which is described as follows: security is only as strong
as its weakest link. The person who develops, runs, and employs the system is frequently referred to as the
system’s weakest link. Additionally, users may decide to disregard or even circumvent a security feature if it
stops them from doing the intended action (for example, due to poor user interface design, slow performance,
or unclear instructions). IoT devices frequently lack convenient input and output interfaces, making it possible
for non-technical users to get around the original security mechanisms. This raises the probability and danger
of human mistake and makes malware more likely to propagate [12], [13].
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
5. 4456 ❒ ISSN: 2088-8708
Recently, the ratio of smart phones, tablets, and smart watches to people was almost one person to two
devices. Today, technical innovation is increasing, and the market for smartphones is always expanding. The
IoT is a hot issue right now, and smart cities are being built using it extensively. This technology is expected to
transform many aspects of our daily lives given the booming nature of research in this subject, both in academia
and industry. The three-layered structure of the IoT model is determined by its functionalities and consists of a
perception layer, a network layer, and an application layer [14]. As follows, this is further explained:
− Perception layer: This is considering the main sense of the IoT. It aims at recognizing any objects with
gathering all information. This layer contains RFID tags with its labels’ and code readers.
− Network layer: This layer represents the entire and main work of the IoT. It processes and forwards in-
formation which is received from the main perception layer to upper layer such as the application layer
[14].
− Application layer: To actualize the IoT’s advanced capabilities, this layer fuses the socio-business require-
ments for the technology. The fusion of industrial demands and machine intelligence with IoT and industrial
technologies is represented by this layer. The IoT has a two-system structure, which has been the subject of
extensive research. To fully comprehend the IoT and its two-system structure, it is necessary to analyze the
internet and communications networks [15].
3. RELATED WORKS
The internet of things is a term that Kevin Ashton initially coined in 1998 to describe the future of the
Internet and pervasive computing [16]. The ability to connect and reach people around the world in the future
is made possible by this technological revolution. Whether a thing is a connecting device or not, “things”
on the IoT refer to any object on the earth. Anything can be a part of the internet, from a smart device to
a tree’s leaf node or a bottle of beverage. Over the platform, the objects become communication nodes. IoT
sensors and smart communication systems generate data that must be examined in real time using deep learning
techniques, or they can be used to train deep learning for smart models. Given the low-latency requirements of
edge devices and the additional benefits. It provides in terms of privacy, bandwidth efficiency, and scalability,
edge computing is a potential solution to support good and better computation [4].
This paper aims to provide a comprehensive review of the current state of edge computing with the
use of smart IoT end devices [16]. This paper also explains an overview of applications where deep learning
technology has used at the network edge, explains the techniques for training deep learning models across
numerous edge devices and examines various methodology for swiftly conducting deep learning inference
across a combination of end devices, edge servers, and the cloud [6]. IoT applications using smart devices have
rapidly increased in number and started to be widely used by a diverse range of end users. This is because of
the scale of development of smart devices [17]. IoT devices are employed in remote health monitoring and
emergency notification systems. Why do we mention healthcare? Nowadays, as during coronavirus disease
(COVID-19), people are not able to travel and consult their doctor. Hence, they have started to use the internet
to keep in contact for any emergency issues.
As a result, people have begun to employ monitoring devices, which range from basic ones like blood
pressure and heart rate monitors to more sophisticated ones that can keep an eye on specialized implants like
pacemakers, FitBit gadgets, risk bands, and cutting-edge hearing aids. Real-time data transfer on the patient’s
vital signs is made possible via the IoT using this network. An emergency alert is triggered whenever one of
these crucial factors changes significantly.
The early IoT-based healthcare research initiatives were centered on this phenomena. Integrity ensures
that an opponent cannot disconnect and corrupt the video data while it is being transmitted. The IoT is based
on information sharing between many types of devices, including interior gateway protocol (IGP) or mobile
ad-hoc network (MANET) networks. When data are received from the correct sender, it is crucial to assure
data accuracy by using a virtual path with a high-priority label and to check to see if the data have been altered
during transmission.
Yuan et al. [18] has done an experiment to demonstrate that the reliability and performance of the
clouds under investigation fall short of expectations. As a result, despite showing a terrible adaptability based
on temporary and immediate resources, the author has noted in his research that cloud computing is insufficient
and inefficient for complete scientific processing. The present study has therefore studied the improvement of
current clouds related to computer networks and the establishment of a unique research avenue. By including
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466
6. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4457
more cloud services, such as a database, private cloud, queuing service, and storage, future work can expand on
this. The network layer of the IoT offers functionality in terms of real data-time traffic routing and transmissions
to many different IoT devices over the IGP or MANET networks. Internet gateways, switching and routing
devices, among others, operate with the application of recent updated technologies. The network gateways
serve as mediators between different IoT nodes by aggregating, filtering and transmitting data to and from
different sensors [19]. This paper will also describe the various difficulties, such as cyberattacks, which have
an impact on technology and network performance. The following ideas will be retained by the reader as
a result of this essay: Understanding the network use cases for deep learning at the network edge, typical
methods for accelerating deep learning inference, distributed training on edge devices, and current trends and
possibilities [20].
According to IBM, the huge number of devices which are connected to the internet will be increased
more and more, and will exceed the number of human beings. The focus of current research has tended to be
on the control of real-time traffic data by locating the finest historical nodes that can offer the most reliable path
based on their history. Our algorithm will take care of this. Buriol et al. [21] talked about anomalous traffic
scenarios, the spread of information, and the identification of delay or failure that shows a dangerous traffic
pattern, as in the case of IoT activities involving real-time data. In this research, we present an algorithm to
identify real-time high-emergency data that must be sent from destination to receiver nodes, to clear all other
unneeded traffic to create room for these data, and to do so utilizing nodes with a high-priority label. We
provide a low-cost speech recognition method and implement inquiry packet detection to identify the existence
of labeled data traffic using our algorithm. Attacks might cause delays and failures as well, thus the suggested
approach will help to utilize another node did not not affected by any threatening .
Increased attacks lead to so many issues, which affect our daily life of an individual or disturb the
services for all users connected on the network. To avoid much delay time being wasted on the main path,
controlling traffic using clever algorithms that can choose guaranteed paths is crucial [22]. The number of road
accidents has also increased due to traffic. The suggested approach employs cloud computing to report to the
next station when it detects high-emergency real-time data flow. Data transport between the server and client
is made possible by two different processes. Numerous projects have been undertaken in the area of traffic
engineering. The transmission control protocol/internet protocol (TCP/IP) protocol is used in the proposed
system to transport data [13].
The main concern that comes up with IoT-cloud integration is the real fact that from base infrastruc-
tural to service domains, cloud models are beset by many different security challenges, such as application
services attack, data integrity attack, privacy, trusts, identity, and standardization. All these challenges are most
likely to occur when two or more platforms are merged, thus raising some deep research questions which need
to be explored. Accordingly, some research studies by the international data corporation (IDC) claim that, while
business company leaders notice the potential of the IoT, they are deeply skeptical about the system’s inherent
security challenges on the main network. Moreover, the study asserts that most business leaders admit having
a limited understanding of the security threats IoT brings during transmission. In addition, a related study
from Klynveld Peat Marwick Goerdeler (KPMG) stated that the security breaches in consumer data, as well
as up to date attacks on cyber infrastructure systems worldwide, make IoT users lose trust and avoid solution
providers who have not taken the appropriate measures to protect their systems [23]. The major challenge of
cyber security on IoT platforms is a global concern which requires a holistic assessment on the part of research
and different industrial communities [24], [25].
4. PROBLEM DEFINITION
Currently, the data in the network which needs to be transferred from source to final destination faces
many problems because of attackers, such as delays, congestion, the loss of data packets preventing any data
from being received or even raising jitters. The internet has grown with the increase in the number of users
and many generations have been raised, such as 5G or fiber optic. Both are results of the increase in network
speed when exchanging data. Hence, IoT is considered one of the most important topics and has started to be
used in some parts in the world. The problem here is two parts. Firstly, we need to concerns on the instructions
(data packets) of how to be received between sender and end nodes when using a smart machine which will
execute these instructions without any delay, in an accurate way, once the threat has occurred. Secondly, the
proposed algorithm will deal with these notifications coming from a smart machine by sending a notification
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
7. 4458 ❒ ISSN: 2088-8708
to the sender node to start using a new path, which will help to accomplish the mission successfully.
Hence, we mainly consider the data which is forwarded and received as real time traffic in live stream-
ing connections, and these connections should be reliable. No problems can occur while the connection is open
between them (source and destination). There are some examples - such as emergency situations, or performing
surgery via live video streaming, when this problem could have severe consequences. As we mentioned, traffic
paths might not work effectively due to congestion in the network. In this paper we proposed an intelligent
algorithm to work with the routing protocol and to focus on the node buffers, and also on the loss of important
packets during connections. The main object is to reduce and avoid delay if the buffer for each node on the
selected path has any of these packets, by making our rout attack with detection algorithm (RAWD) algorithms
reroute the main traffic, and distinguish between the negligible packets and high priority ones, in order to begin
forwarding the main data to the required destination. All of the devices may also be intelligent to accomplish
the goals. By providing more effective solutions, our algorithm will assist the current routing protocol and
even hardware devices in establishing stronger links that will result in the successful completion of the mission
between the source and the destination. However, our algorithm’s drawback is that it must determine which
network nodes have been impacted by the attacker. The main problem is if the attacker or intrusion affects
the nodes on the main path and also the one that can be used for backup. As a result, the algorithm will take
more time to find another path. Therefore, we have found a solution to this problem by using different ways of
rerouting traffic, such as from adjacent nodes or from the source itself.
As a result, in the suggested system, traffic control is carried out automatically with the aid of the
IoT, and the required steps are made to address these issues. In order to compute a new way from source to
destination by choosing a different path that has not yet been affected, we developed a clever method RAWD
that can compute an alternate path from the node that is currently under assault on the main path first. A
monitoring packet is also present to keep an eye out for any emergency packets that may arrive inside the
buffer but have not yet been delivered. The program will attempt to warn the node that must be dispatched
immediately in order to finish the task.
4.1. The new technique and algorithm
In order to ensure that there is always at least one available path between the source and the destination
in the network design, we have suggested a novel path-protecting technique that makes use of a mesh topology
and our heuristic algorithm. We are concerned with one approach for network survival: a restoration technique
that might be more effective in terms of resource usage. The ability to recover from node failure is a key
benefit of mesh topology-based path protection over links.It can discover a variety of additional routes between
every node in the network. Additionally, our suggested method ensures that the traffic between the source and
destination will not be lost and that the new way will not be impacted [26], [27].
We employed the suggested technique to examine the performance of the best path in the network
design on networks with a large number of nodes, such as mesh topology. Any topology containing a huge
number of nodes is considered to be more attractive for hacking and at the same time useful for finding an
optimal solution for large or medium networks, with a lot of traffic passing from it. For a network with a small
number of nodes, there are various challenges, including lengthy processing times and a need for numerous
variables and restrictions for path protection [28]. As a result, these factors serve as powerful inducements to
create speedier path protection with reference to the few and few edges between nodes. The goal is to determine
the overall spare capacity in the event of a path failure. The main important role is to select the topology has
meet all required rules to find many alternative paths such as p-cycle topologies [24]. We have two kinds of
path as follows:
− Full and main path relationship checked, which determines that the path span is disjointed for a given
primary one, or it might be used by the primary one, with guarantees that there is another branch from the
same source can have different port connected with other path but it might be longer than the main one
deliver the packets to the destination without affecting the QoS network once the attack has occurred. If the
path does not contains a common paths on the mesh topology then our algorithm cannot be applied in this
case. Other than end nodes, the path could have one or more common nodes.
− Path mutual relations are examined to see whether the paths are mutually and totally disconnected and to
see if they lack common spans yet have nodes other than end nodes.
In Figure 4, we showed a RAWD algorithm how it works for detecting and determining the required
path to open the new path between source and destination before any injection. The RAWD algorithm comes
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466
8. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4459
to check where the path that has low congestion. It may also be the second-shortest way, but this is not
necessary because, as our results demonstrated, once we reserve the area with the least amount of congestion
and maintain it open for emergency vehicles, the wait will not be much increased. The RAWD algorithm will
use link-state database (LSDB) for each node to make sure this node is capable of being used during the normal
transmission, with any disturbance or noise. This is based on the old history for each node in the topology and
its’ fault tolerance capacity. As we show in the flowchart, the algorithm will start to work after the main routing
protocol has built the main routing table for the networks.
Figure 4. Flowchart of the proposed algorithm
The algorithm 1 shows how the nodes are selected after the routing table is constructed by the existing
routing protocol, as we can apply the proposed algorithm for pre-active or pro-active protocol. Hereafter,
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
9. 4460 ❒ ISSN: 2088-8708
the algorithm will be working on the network before any attack, but at the same time the algorithm keeps
monitoring the nodes or links if they go down in order to provide a fast solution in case of being affected by the
attacker once the connection is lost. The RAWD algorithm will be able to start figuring out the path between
the source and its destination thanks to the IoT smart approach, which is based on the information gathering
and registered record. This will allow the algorithm to start transmitting and receiving data.
Algorithm 1 PSO
1: SelectMainPath(Tr, s, d, edges to avoid)
2: Tr: Routing table constructed by existing RP
3: V : The vertices for each node G(V, E)
4: s: Negligible packets
5: RAWD: The RAWD view RT and then start to maintain the backup one
6: MainData: exchanging Packets
7: d: The final destination
8: pa(s, NextH op) ← ∅ packets start moving from S to D
9: if thens ̸= d
10: qsub ← ∅ Node Buffer’s
11: while Q ̸= ∅ and pa(s, NextHop to dest) = ∅ do
12: (qsub, x) ← Front(Q)
13: for all dok ∈ Γ(x) k: is the intermediate node which consider next hop
14: e ← (x, k) full path
15: pa(s, d) ← qsub ∪ e ∪ Pr(Tr, k, d) k all intermediate nodes n
16: Enqueue(Q, (qsub ∪ e, k))
17: end for
18: Dequeue(Q)
19:
20: end while
21: Q ← ∅
22:
23: end if
24: return pa(s, d)
The main backup path will only be available for any emergency issue which has been raised from any
nodes on the main path. However, in case the nodes in the main path receive other packets, the RAWD will
reroute any other packets via its other adjacent nodes has been selected by the RAWD algorithm to deliver
data packets to the final destination. The smart algorithm needs to work without having any effect on other
traffic. Each node can store large emergency packets in its buffer if they are received, preventing packet loss
and maintaining a high level of service. Considering the enormous availability in the path, this will not cause
the delay to grow. Since the routing protocol constructs the routing table and then configures our algorithm in
accordance with the succeeding steps inside the routing protocol, it may be utilized with any routing protocol,
as we already said. This presumes the deployment of a proactive routing mechanism. In contrast, a pre-active
one eliminates the requirement to scan the full topology because the algorithm can only select the fastest way
without knowledge of the network’s other nodes. As illustrated in Figure 3, will make the assumption in our
protocol that every node on the principal path is connected to an adjacent node that has met all of our protocol
requirements.
− The RAWD algorithm chooses all nodes on the path, all of which should be recorded and have a very solid
history, to be part of the booked path between the source and the desired destination. The algorithm will
make a decision based on the data taken from the LSDB to create the routing table.
− To gain a complete picture of the network, the RAWD algorithm will import the routing table, which is
produced from the routing protocol. From there, it will begin to choose nodes one by one until we reach
our target.
− In this technique, all nodes on the main path should has at least an adjacent node, and then by using RWAD
algorithm this adjacent node will be ready to receive other data traffic from the selected node if it receives
packets by mistake or is broadcasting one.
− To prevent a network loop, the nearby node needs to be aware that any packets it receives from the chosen
node on the path should pass through another node and not be sent back. This can be done by sending
inquiry packets to all nearby nodes, alerting them that the packets have come from it and will be sent to
you directly. Do not transmit the packets back to me until I send information packets indicating that I am
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466
10. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4461
available and the session is over. First, this mechanism scans and verifies every path between nodes in
the main routing table; second, it creates a path from the main routing table (if possible); or, if we use a
pre-active protocol, such as ad hoc on-demand distance vector (AODV), we can use the same path.
Algorithm 1 using a buffer as an example, the algorithm demonstrates how it functions in general.
We will locate the chosen nodes from the complete topology between sender and destination based on the
link status database. While the routing protocol will compute the main routing table with the optimal and
shortest path between any source and destination. Once its completed, all emergency packets will begin to be
transmitted hop by hop as soon as the data will start to be sent.
5. SIMULATION ENVIRONMENT
This section presents a detailed explanation of sending secure data between source and destination.
We simulate in network simulation (NS2) a 30-minutes on-line live packets streaming as user datagram pro-
tocol (UDP) packets and also, with this kind of traffic, if we lose any drop packets we cannot get them again,
such as TCP protocol. In addition, the UDP protocol is a good example of video live streaming packet trans-
mission. The QoS is optimized in source point computing during healthcare, or any other video transmission
at a remote location. Better visualization with big sensing is analyzed during remote sensing to portray a
clear picture and also provide a highway for receiving data in less time of the incident of attack throughout
many experiments, with the multi-hop communication scenario. A good example would be conducting surgery
abroad using IoT smart robotics. This kind of operation needs to be a very high priority, and any delay or
loss of connection would be a huge disaster. The backup path is considered one of the most important priori-
ties nowadays. The backup path not only prevents disastrous problems; it also increases the performance and
efficiency of the network. This will increase the reliability for all end users and companies. Here, we make
the assumption that the media stream has substantial variability, such as when an emergency patient is being
dissected during surgery, which results in higher delays and higher peak variable frame rates. In Table 1, we
describe the configuration parameters. The experimental results in Table 1 show a study of RAWD’s perfor-
mance when re-routing regular packets based on different buffer sizes with the start-up delays of 0 to 2 frames.
It was found that decreasing idle time reduces the rate variability of the media sequence.The simulation is
running for expecting a 99% confidence level in the outcome. The parameters configuration are presented in
Table 1. As mentioned above, we contrast RAWD with other prior research. In order to demonstrate that
our new technique, RAWD, will not impact networks if other packets are forwarded to different destinations
concurrently, an experiment is showing that takes into account the client buffer size. By lowering the packet
loss ratio, which displays a smooth packets mean ratio, less delay, and less jitter, we are able to establish a
trade-off between packet size and buffer size. We simulated various mesh topology scenarios in NS2 to assess
the efficacy of the RAWD algorithm in a smart city IoT setting.
The number of nodes varied depending on the scenario. We also gave each experiment’s potential
network traffic capacity some thought. The topology that we have used is from 50 raised up to 200 nodes;
the source node was at the beginning of the network, while the destination node alternately generated normal
and urgent data packets over the course of a few seconds. NS2 was performed to determine how effectively
the proposed long VPN path will work in receiving high-priority traffic for medical operations or any other
important high-emergency traffic needing the on-demand protocol between nodes in networks. The data trans-
mission in the networks was well supported by the information acquired by the NS2 simulation. An average
was calculated after 30 iterations of the simulation. The bit rate was set to 2 Mb/s, and the packet size was
100B. During the simulation, a traffic rate of 200 kb/s was produced from the source node to the destination.
Table 1. Experimental parameters for medical instruction transmission
Parameter Value Value Parameter
Total video frames (F) 1440 Video frame total time (T1) 30 min
Video frame rate (r(t)) 3 sec Video frame length (L)f 100 B
Video frame arrival time (t) 5sec Inter-arrival timeδ 1 msec
Buffer size (Buffer) 64 KB, 512 KB, 2 MB, 4 MB Initial buffer size 0
Before examining the performance issues for the network topologies with relation to computing a next
hop over various networks, it is critical to identify the network factors that can affect the QoS of the streamed
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
11. 4462 ❒ ISSN: 2088-8708
video traffic. The main focus of this study is on three elements in order to more precisely predict how video
traffic methods will perform:
− Packet loss ratio: This is the packet lost during the transmission
− Average delay time in the buffer: it is the time between sending and receiving data packets include the time
that all packets stayed in the buffer.
However, by applying our technique to prepare an adjacent node to be the next hop if the necessary
conditions are present, we have added an extension to the routing protocol. As we previously explained, we
add enquiry packets with negligible sizes to find the next hop as an alternative to urgent packets and gather all
the required information about the full topology. However, by applying our technique to prepare an adjacent
node to be the next hop if the necessary conditions are present, we have added an extension to the routing
protocol. As we previously explained,by adding an inquiry of urgent packets. this tiny inquiry packets are
going to discover the next hop and collect all the necessary data about the entire topology.
5.1. Experimental results
We have particularly seen how node density affects the latency of real-time traffic transmission. By
steadily adding nodes, we were able to simulate the reference scenarios, and the simulation was ran 20 times for
each test. The confidence intervals that were gathered were consistently less than 5% of the predicted average.
In Figure 5, the streaming test was built between source and destination, so the data traffics are starting to move
via the main path. The initial test is done when the many unknown packets start to appear in the network. This
issue will start to affect the performance of the live image or video streaming. In this case, many events can
occur, such as failure in the path, or the node cannot tolerate the huge number of negligible packets that will
affect the nodes on the main path.
Figure 5. Link utilization for the all networks
As shown in Figure 5, the utilization has been increased on the main path, but the proposed algorithm
can use another path with new nodes in the same networks to reroute the traffic to the required destination. It
is a smart way that RAWD can detect the attack by checking the unknown packets. However, the algorithm
showed that the new backup path can be used without any congestion.
Figure 6 confirmed the result of the utilization by showing that the load is going down for the new
path. The results compared well with different types of network effect, such as node failure, adjacent failure
and link down. We have also showed when the routing protocol handles the problem by recomputing and
creating a new routing table to find a new path between source and destination. We have found the problem
can be solved, but it will take a lot of time. This is because the existing routing protocol should compute the
routing from the beginning.
In Figure 7 we compared the results produced by the RAWD algorithm and all the other cases men-
tioned, such as the main routing protocol without any enhancements. As we can see, the delay has been reduced
by our proposed algorithm, as it has used the path which is not under attack. The other results show different
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466
12. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4463
effects but we can see that in both situations the rerouting traffic from the adjacent is getting high. This is
because the main path is still under attack, so if any other traffic needs to be passed via it, then the congestion
will be increased and the load will be increased, as we can see in Figure 6.
We can also see that the RAWD algorithm has created a new path to improve the way for high priority
traffic between source and destination. In terms of receiving real-time data, the proposed algorithm has showed
improvements by reducing delay and loss of packets in live streaming transmission. In addition, the data
packets showed continuity improvements when passing between the nodes among a network. According to the
RAWD algorithm, a secure path was booked between the source and destination. This path has been selected as
a second best path which has selected by our proposed algorithm. The path consider secure as it s coming from
the adjacent node which is effected by the attacker. Based on the routing table that is produced by the network’s
primary routing protocol, the algorithm chose this introduce secure path. However, in Figure 7, we made sure
that the nodes are only passed to emergency packets and that the long path is reserved until the session duration
is up, the delay time has also decreased.
Figure 6. Load in the network
Figure 7. Packet delay from S-D
The Figures 8 and 9 illustrate various scenarios, such as the unexpected rerouting of regular packets
that a node selected for booking may experience. In this situation, the algorithm can reroute the traffic to the
nearby node; although though the delay time would lengthen, it will still be better than in all other situations.
The total number of packets received across all experiments determines the throughput.
Additionally, the loss of packets will be decreased because of the delay will be reduced and the path
between the source and destination will be set aside for the priority packets, as shown in Figure 8 and the
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
13. 4464 ❒ ISSN: 2088-8708
throughput will be increased. We can prove our results by looking at Figure 5. The results here show how the
average path utilization has been affected by the main data and other packets are coming from an unknown
source. However, their range is below the threshold values of latency and jitters for receiving the data. On the
other hand, the mean packet loss value increased even with an increase in the node buffer size. However, The
testing results make it clear that any parameter from node buffer size and reroute that varies out of proportion
to each other would have an effect on the proposed RAWD’s performance.
After doing an experimental research, it was discovered that our suggested technique significantly
improves when the primary path is subjected to a DoS assault. In Figure 9, it is observed that the negligible
packet, or in other words the attacking one, has formed a heavy load on the network. We have monitored the
network when any attack occurred and we found out that these packets are causing harm as we can see in the
Figure 9. In the meantime, so the being affected can lead to loss of the connection, and waiting for a solution
from the main routing protocol or any other firewalls.
Figure 8. Packets loss during the attack
Figure 9. Unknown packet (attacker)
6. CONCLUSION
The paper proposes a new algorithm, RAWD, to create a new and smart path in the network between
source and destination. This path will be used in case an attacker tries to broadcast a huge number of negligible
packets, to increase the speed of receiving the emergency data and secure one during the DoS attack. The
emergency evaluation problem is transformed into a conventional network flow problem in order to address
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466
14. Int J Elec & Comp Eng ISSN: 2088-8708 ❒ 4465
the issues of network congestion, delay time, and throughput, as well as to reduce the load on the necessary
path and the amount of time required for evacuation. Creating a backup path from the current routing table by
taking a thorough picture of all network nodes is the goal here. We also try to make each node retain the main
packets in its buffer until starting to reroute from the new path. Additionally, the buffer enables us to prevent the
loss of any emergency packets that may unintentionally come from other nodes. These regular packets will be
diverted immediately along the secure way, which is taken into consideration in the event of an attack. When
the packets are given a priority, managing the network congestion problem is easier. Our simulation results
have shown that our solution outperforms the alternatives in terms of network congestion, throughput, delay
time, loss ratio, and network overheads, among many other important metrics.
ACKNOWLEDGEMENTS
This research was supported and funded by the research sector, Arab Open University -Kuwait Branch
under decision number 22005.
REFERENCES
[1] K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber threats to industrial IoT: a survey on attacks and
countermeasures,” IoT, vol. 2, no. 1, pp. 163–186, Mar. 2021, doi: 10.3390/iot2010009.
[2] S.-M. Cheng, P.-Y. Chen, C.-C. Lin, and H.-C. Hsiao, “Traffic-aware patching for cyber security in mobile IoT,” IEEE
Communications Magazine, vol. 55, no. 7, pp. 29–35, 2017, doi: 10.1109/MCOM.2017.1600993.
[3] Y. I. Alzoubi, V. H. Osmanaj, A. Jaradat, and A. Al-Ahmad, “Fog computing security and privacy for the internet of
thing applications: state-of-the-art,” Security and Privacy, vol. 4, no. 2, Mar. 2021, doi: 10.1002/spy2.145.
[4] O. Tavallaie, J. Taheri, and A. Y. Zomaya, “Design and optimization of traffic-aware TSCH scheduling for mobile
6TiSCH networks,” in Proceedings of the International Conference on Internet-of-Things Design and Implementa-
tion, May 2021, pp. 234–246, doi: 10.1145/3450268.3453523.
[5] R. Sethi, B. Bhushan, N. Sharma, R. Kumar, and I. Kaushik, “Applicability of industrial IoT in diversified sectors:
evolution, applications and challenges,” in Multimedia Technologies in the Internet of Things Environment, Springer,
2021, pp. 45–67.
[6] H. Cui, P. Sun, and A. Boukerche, “A novel cloud-based traffic aware data routing protocol for smart connected
vehicles,” Computing, vol. 104, no. 7, pp. 1701–1720, Jul. 2022, doi: 10.1007/s00607-022-01068-3.
[7] S. Tweneboah-Koduah, K. E. Skouby, and R. Tadayoni, “Cyber security threats to IoT applications and service
domains,” Wireless Personal Communications, vol. 95, no. 1, pp. 169–185, 2017, doi: 10.1007/s11277-017-4434-6.
[8] A. M. Albalawi and M. A. Almaiah, “Assessing and reviewing of cyber-security threats, attacks, mitigation techniques
in Iot environment,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 9, pp. 2988–3011,
2022.
[9] F. Ullah et al., “Cyber security threats detection in internet of things using deep learning approach,” IEEE Access,
vol. 7, pp. 124379–124389, 2019, doi: 10.1109/ACCESS.2019.2937347.
[10] S. Ghazanfar, F. Hussain, A. U. Rehman, U. U. Fayyaz, F. Shahzad, and G. A. Shah, “IoT-flock: an open-source
framework for IoT traffic generation,” in 2020 International Conference on Emerging Trends in Smart Technologies
(ICETST), Mar. 2020, pp. 1–6, doi: 10.1109/ICETST49965.2020.9080732.
[11] I. Cvitić, D. Peraković, M. Periša, and M. Botica, “Novel approach for detection of IoT generated DDoS traffic,”
Wireless Networks, vol. 27, no. 3, pp. 1573–1586, Apr. 2021, doi: 10.1007/s11276-019-02043-1.
[12] R. J. Raimundo and A. T. Rosário, “Cybersecurity in the internet of things in industrial management,” Applied Sci-
ences, vol. 12, no. 3, Feb. 2022, doi: 10.3390/app12031598.
[13] A. Rayes and S. Salam, Internet of things from hype to reality. Cham: Springer International Publishing, 2022.
[14] M. S. Farooq, O. O. Sohail, A. Abid, and S. Rasheed, “A survey on the role of iot in agriculture for the implementation
of smart livestock environment,” IEEE Access, vol. 10, pp. 9483–9505, 2022, doi: 10.1109/ACCESS.2022.3142848.
[15] H. Kharrufa, H. A. A. Al-Kashoash, and A. H. Kemp, “RPL-based routing protocols in IoT applications: a review,”
IEEE Sensors Journal, vol. 19, no. 15, pp. 5952–5967, 2019, doi: 10.1109/JSEN.2019.2910881.
[16] S. K. Prasad, T. Sharma, V. Sharma, and S. Chauhan, “RSETR: route stability based energy and traffic aware reac-
tive routing protocol for mobile ad hoc network,” in 2022 IEEE Delhi Section Conference (DELCON), Feb. 2022,
pp. 1–9, doi: 10.1109/DELCON54057.2022.9753442.
[17] M. Conti, P. Kaliyar, M. M. Rabbani, and S. Ranise, “Attestation-enabled secure and scalable routing protocol for
IoT networks,” Ad Hoc Networks, vol. 98, Mar. 2020, doi: 10.1016/j.adhoc.2019.102054.
[18] X. Yuan, C. Li, and X. Li, “DeepDefense: identifying DDoS attack via deep learning,” in 2017 IEEE International
Conference on Smart Computing (SMARTCOMP), May 2017, pp. 1–8, doi: 10.1109/SMARTCOMP.2017.7946998.
[19] F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, “An overview of security and privacy in smart cities’ IoT
A new algorithm to enhance security against cyber threats for ... (Radwan S. Abujassar)
15. 4466 ❒ ISSN: 2088-8708
communications,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, Mar. 2022,
doi: 10.1002/ett.3677.
[20] B. Susilo and R. F. Sari, “Intrusion detection in IoT networks using deep learning algorithm,” Information, vol. 11,
no. 5, May 2020, doi: 10.3390/info11050279.
[21] L. S. Buriol, M. G. C. Resende, C. C. Ribeiro, and M. Thorup, “A memetic algorithm for OSPF routing,” in Proceed-
ings of the 6th
INFORMS Telecom, 2002, pp. 187–188.
[22] M. A. V. Paul, T. A. Sagar, S. Venkatesan, and A. K. Gupta, “Impact of mobility in IoT devices for healthcare,” in
Lecture Notes on Data Engineering and Communications Technologies, vol. 21, doi: 10.1007 978-3-319-93940-7 11,
2019, pp. 243–261.
[23] K. Sha, T. A. Yang, W. Wei, and S. Davari, “A survey of edge computing-based designs for IoT security,” Digital
Communications and Networks, vol. 6, no. 2, pp. 195–202, May 2020, doi: 10.1016/j.dcan.2019.08.006.
[24] M. Z. Gunduz and R. Das, “Cyber-security on smart grid: Threats and potential solutions,” Computer Networks, vol.
169, Mar. 2020, doi: 10.1016/j.comnet.2019.107094.
[25] D. G. S. Pivoto, L. F. F. de Almeida, R. da Rosa Righi, J. J. P. C. Rodrigues, A. B. Lugli, and A. M. Alberti, “Cyber-
physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review,”
Journal of Manufacturing Systems, vol. 58, pp. 176–192, Jan. 2021, doi: 10.1016/j.jmsy.2020.11.017.
[26] M. Al-Husban, A. Al-Husban, and H. Yaseen, “Cyber attack detection technique to improve cyber security using data
mining methods,” in Istanbul Bosphorus International Cyberpolitics, Cyberlaw and Cybersecurity Conference, 2017.
[27] H. Yaseen, A. S. Al-Adwan, M. Nofal, H. Hmoud, and R. S. Abujassar, “Factors influencing cloud computing adop-
tion among SMEs: the jordanian context,” Information Development, Apr. 2022, doi: 10.1177/02666669211047916.
[28] R. S. Abujassar, H. Yaseen, and A. S. Al-Adwan, “A highly effective route for real-time traffic using an iot smart
algorithm for tele-surgery using 5G networks,” Journal of Sensor and Actuator Networks, vol. 10, no. 2, Apr. 2021,
doi: 10.3390/jsan10020030.
BIOGRAPHIES OF AUTHORS
Radwan S. Abujassar is currently Associate professor at the Computer Science at the
ITC program in Arab Open University which is following the OU University in UK. Dr Radwan
was in the computer Engineering department of the faculty of Engineering at the Bursa Orhangazi
University in Turkey. Dr. Radwan received his B.Sc. degree from Applied Science University,
Amman, Jordan in 2004, and M.Sc. degree from New York Institute of Technology in 2007, both in
computer science. His Ph.D. degree in computing and electronic in the field of IP recovery in IGP
and MANET networks from University of Essex, UK in 2012. His research interests include network
and controls, routing protocols, cloud computing and network security. He can be contacted at email:
r.abujassar@aou.edu.kw.
Mohamed Sayed received his B.S. degree in Computer Engineering from Alexandria Uni-
versity as the first rank in June 1987, his M.Sc. degree in Engineering Mathematics from Alexandria
University in 1992 and Ph.D. degree in Mathematics of Computing from Birmingham University in
1998. Prof. He is now the Rector of the Arab Open University in Kuwait. His research interests are
in computational algebra and enumeration, pattern recognition and deep machine learning. He is a
member of IEEE, LMS, SIAM. He can be contacted at email: msayed@aou.edu.kw.
Husam Yaseen is an Associate Professor of E-Business and Business Analytics at Ameri-
can University of Madaba, Jordan. He holds a Ph.D. in Information Systems/E-Commerce from The
University of Portsmouth, UK. He is particularly specialized in digital business transformation and
development. His research interests include UX, Digital Marketing, Business Analytics, e-commerce,
IoT, cyber security, cloud computing and online purchase behaviour. Address: Business Adminis-
tration Department, Faculty of Business and Finance, American University of Madaba. He can be
contacted at email: h.yaseen@aum.edu.jo.
Int J Elec & Comp Eng, Vol. 13, No. 4, August 2023: 4452-4466