Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. Existing approaches for the realization of remote attestation measure the trustworthiness of a target platform from its binaries, configurations, properties or security policies. All these approaches are low-level attestation techniques only, and none of them define what a trusted behavior actually is and how to specify it. In this paper, we present a novel approach where the trustworthiness of a platform is associated with the behavior of a policy model. In our approach, the behavior of a policy model is attested rather than a software or hardware platform. Thus, the attestation feature is not tied to a specific software or hardware platform, or to a particular remote attestation technique, or to an individual type of security policy. We select usage control (UCON) as our target policy model as it is a comprehensive and flexible model. We propose a framework to identify, specify, and attest different behaviors of UCON.
Wireless body area network (WBAN) is one of the specialized branches of wireless sensor networks (WSNs), which draws attention from various fields of science, such as medicine, engineering, physics, biology, and computer science. It has emerged as an important research area contributing to sports, social welfare, and medical treatment. One of the most important technologies of WBANs is routing technology. For efficient routing in WBANs, multiple network operations, such as network stability, throughput, energy efficiency, end-to-end delay, and packet delivery ratio, must be considered. In this paper, a robust and efficient Energy Harvested-aware Routing protocol with Clustering approach in Body area networks (EH-RCB) is proposed. It is designed with the intent to stabilize the operation of WBANs by choosing the best forwarder node, which is based on optimal calculated Cost Function (C.F). The C.F considers the link SNR, required transmission power, the distance between nodes, and total available energy, i.e., harvested energy and residual energy. Comprehensive simulation has been conducted, supported by NS-2 and C++ simulations tools to compare EH-RCB with existing protocols named DSCB, EERP, RE-ATTEMPT, and EECBSR. The results indicate a significant improvement in the EH-RCB in terms of the end-to-end delay network stability, packet delivery ratio, and network throughput. INDEX TERMS Clustering, end-to-end delay, harvesting, network stability, packet delivery ratio, throughput, WBANs.
Mobile and cell devices have empowered end users to tweak their cell phones more than ever and introduce applications just as we used to with personal computers. Android likewise portrays an uprise in mobile devices and personal digital assistants. It is an open‐source versatile platform fueling incalculable hardware units, tablets, televisions, auto amusement frameworks, digital boxes, and so forth. In a generally shorter life cycle, Android also has additionally experienced a mammoth development in application malware. In this context, a toweringly large measure of strategies has been proposed in theory for the examination and detection of these harmful applications for the Android platform. These strategies attempt to both statically reverse engineer the application and elicit meaningful information as features manually or dynamically endeavor to quantify the runtime behavior of the application to identify malevolence. The overgrowing nature of Android malware has enormously debilitated the support of protective measures, which leaves the platforms such as Android feeble for novel and mysterious malware. Machine learning is being utilized for malware diagnosis in mobile phones as a common practice and in Android distinctively. It is important to specify here that these systems, however, utilize and adapt the learning‐based techniques, yet the overhead of hand‐created features limits ease of use of such methods in reality by an end user. As a solution to this issue, we mean to make utilization of deep learning–based algorithms as the fundamental arrangement for malware examination on Android. Deep learning turns up as another way of research that has bid the scientific community in the fields of vision, speech, and natural language processing. Of late, models set up on deep convolution networks outmatched techniques utilizing handmade descriptive features at various undertakings. Likewise, our proposed technique to cater malware detection is by design a deep learning model making use of generative adversarial networks, which is responsible to detect the Android malware via famous two‐player game theory for a rock‐paper‐scissor problem. We have used three state‐of‐the‐art datasets and augmented a large‐scale dataset of opcodes extracted from the Android Package Kit bytecode and used in our experiments. Our technique achieves F1 score of 99% with a receiver operating characteristic of 99% on the bytecode dataset. This proves the usefulness of our technique and that it can generally be adopted in real life.
The ball and beam system is one of the commonly used benchmark control apparatus for evaluating numerous different real systems and control strategies. It is an inherently nonlinear and open-loop unstable system. In this paper, we have suggested an Evolutionary Algorithm (EA) based Proportional Integral-Proportional Derivative (PI-PD) controller for the set point tracking of this well-known ball and beam system. A linearized model of the ball and beam system is deduced and PI-PID control methodology is employed. The popular EA technique such as Genetic algorithm (GA) is used for tuning of the controller. The optimized values of the controller parameters are achieved by solving a fitness function using GA. The transient performance of the proposed GA based PI-PD controller (GA-PI-PD) is evaluated by carrying set point tracking analysis of the ball and beam system through MATLAB/Simulink simulations. Furthermore, the performance of GA-PI-PD controller is investigated using four different performance indices such as Integral of squared value of error (ISE), Integral of time multiplied by squared value of error (ITSE), Integral of absolute value of error (IAE) and Integral of time multiplied by absolute value of error (ITAE). The comparison of transient performance including rising time, settling time and % overshoot is made with SIMC-PID and H-infinity controllers. The comparison reveals that GA-PI-PD controller yielded transient response with small % overshoot and settling time. The superior performance of the GA-PI-PD controller has witnessed that it is highly effective for maintaining good stability and the setpoint tracking of ball and beam system with fast settling time and less overshoot than SIMC-PID and H-infinity controllers.
The stability control of nominal frequency and terminal voltage in an interconnected power system (IPS) is always a challenging task for researchers. The load variation or any disturbance affects the active and reactive power demands, which badly influence the normal working of IPS. In order to maintain frequency and terminal voltage at rated values, controllers are installed at generating stations to keep these parameters within the prescribed limits by varying the active and reactive power demands. This is accomplished by load frequency control (LFC) and automatic voltage regulator (AVR) loops, which are coupled to each other. Due to the complexity of the combined AVR-LFC model, the simultaneous control of frequency and terminal voltage in an IPS requires an intelligent control strategy. The performance of IPS solely depends upon the working of the controllers. This work presents the exploration of control methodology based on a proportional integral–proportional derivative (PI-PD) controller with combined LFC-AVR in a multi-area IPS. The PI-PD controller was tuned with recently developed nature-inspired computation algorithms including the Archimedes optimization algorithm (AOA), learner performance-based behavior optimization (LPBO), and modified particle swarm optimization (MPSO). In the earlier part of this work, the proposed methodology was applied to a two-area IPS, and the output responses of LPBO-PI-PD, AOA-PI-PD, and MPSO-PI-PD control schemes were compared with an existing nonlinear threshold-accepting algorithm-based PID (NLTA-PID) controller. After achieving satisfactory results in the two-area IPS, the proposed scheme was examined in a three-area IPS with combined AVR and LFC. Finally, the reliability and efficacy of the proposed methodology was investigated on a three-area IPS with LFC-AVR with variations in the system parameters over a range of  ± 50%. The simulation results and a comprehensive comparison between the controllers clearly demonstrates that the proposed control schemes including LPBO-PI-PD, AOA-PI-PD, and MPSO-PI-PD are very reliable, and they can effectively stabilize the frequency and terminal voltage in a multi-area IPS with combined LFC and AVR.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.