Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in industries and various sectors of human life to provide a wide range of applications and services. During the last decade, there has been a growing focus of research in the UAV's assistance paradigm as a fundamental concept resulting in the constant improvement between different kinds of ground networks and the hovering UAVs in the sky. Recently, the wide availability of embedded wireless interfaces in the communicating entities has allowed the deployment of such a paradigm simpler and easiest. Moreover, due to UAVs' controlled mobility and adjustable altitudes, they can be considered as the most appropriate candidate to enhance the performance and overcome the restrictions of ground networks. This comprehensive survey both studies and summarizes the existing UAV-assisted research, such as routing, data gathering, cellular communications, Internet of Things (IoT) networks, and disaster management that supports existing enabling technologies. Descriptions, classifications, and comparative studies related to different UAV-assisted proposals are presented throughout the paper. By pointing out numerous future challenges, it is expected to simulate research in this emerging and hot research area. To the best of our knowledge, there are many survey papers on the topic from a technology perspective. Nevertheless, this survey can be considered as the first attempt at a comprehensive analysis of different types of existing UAV-assisted networks and describes the state-of-the-art in UAV-assisted research.
In this article we have proposed a general transmuted family of distributions with emphasis on the cubic transmuted (CT) family of distributions. This new class of distributions provide additional flexibility in modeling the bi-modal data. The proposed cubic transmuted family of distributions has been linked with the T − X family of distributions proposed by Alzaatreh et al. (2013). Some members of the proposed family of distributions have been discussed. The cubic transmuted exponential distribution has been discussed in detail and various statistical properties of the distribution have been explored. The maximum likelihood estimation for parameters of cubic transmuted exponential distribution has also been discussed alongside Monte Carlo simulation study to assess the performance of the estimation procedure. Finally, the cubic transmuted exponential distribution has been fitted to real datasets to investigate it's applicability.
Recently Internet of Things (IoT) attains tremendous popularity, although this promising technology leads to a variety of security obstacles. The conventional solutions do not suit the new dilemmas brought by the IoT ecosystem. Conversely, Artificial Immune Systems (AIS) is intelligent and adaptive systems mimic the human immune system which holds desirable properties for such a dynamic environment and provides an opportunity to improve IoT security. In this work, we develop a novel hybrid Deep Learning and Dendritic Cell Algorithm (DeepDCA) in the context of an Intrusion Detection System (IDS). The framework adopts Dendritic Cell Algorithm (DCA) and Self Normalizing Neural Network (SNN). The aim of this research is to classify IoT intrusion and minimize the false alarm generation. Also, automate and smooth the signal extraction phase which improves the classification performance. The proposed IDS selects the convenient set of features from the IoT-Bot dataset, performs signal categorization using the SNN then use the DCA for classification. The experimentation results show that DeepDCA performed well in detecting the IoT attacks with a high detection rate demonstrating over 98.73% accuracy and low false-positive rate. Also, we compared these results with State-of-the-art techniques, which showed that our model is capable of performing better classification tasks than SVM, NB, KNN, and MLP. We plan to carry out further experiments to verify the framework using a more challenging dataset and make further comparisons with other signal extraction approaches. Also, involve in real-time (online) attack detection.
Two party authentication schemes can be good candidates for deployment in Internet of Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of Vehicles (IoV) requires fast and secure device-to-device communication without interference of any third party during communication, and this task can be carried out after registration of vehicles with a trusted certificate issuing party. Recently, several authentication protocols were proposed to enable key agreement in two party settings. In this study, we analyze two recent protocols and show that both protocols are insecure against key compromise impersonation attack (KCIA) as well as both lack of user anonymity. Therefore, this paper proposes an improved protocol that does not only resist KCIA and related attacks, but also offers comparable computation and communication. The security of proposed protocol is tested under formal model as well as using well known Burrows–Abadi–Needham (BAN) logic along with a discussion on security features. While resisting the KCIA and related attacks, proposed protocol also provides comparable trade-of between security features and efficiency and completes a round of key agreement in just 13.42 ms, which makes it a promising candidate to be deployed in IoT environments.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.