Today’s advancements in wireless communication technologies have resulted in a tremendous volume of data being generated. Most of our information is part of a widespread network that connects various devices across the globe. The capabilities of electronic devices are also increasing day by day, which leads to more generation and sharing of information. Similarly, as mobile network topologies become more diverse and complicated, the incidence of security breaches has increased. It has hampered the uptake of smart mobile apps and services, which has been accentuated by the large variety of platforms that provide data, storage, computation, and application services to end-users. It becomes necessary in such scenarios to protect data and check its use and misuse. According to the research, an artificial intelligence-based security model should assure the secrecy, integrity, and authenticity of the system, its equipment, and the protocols that control the network, independent of its generation, in order to deal with such a complicated network. The open difficulties that mobile networks still face, such as unauthorised network scanning, fraud links, and so on, have been thoroughly examined. Numerous ML and DL techniques that can be utilised to create a secure environment, as well as various cyber security threats, are discussed. We address the necessity to develop new approaches to provide high security of electronic data in mobile networks because the possibilities for increasing mobile network security are inexhaustible.
In the current era, there are a plethora of mobile phone companies rendering different features. It is challenging to distinguish the best and create correlations among them. However, this can be accomplished through crowdsourcing. Crowdsourcing is the process of gathering information from multiple sources, and we use the AHP (Analytic Hierarchy Process) process to determine which company’s model is the best among many. The weight value of each model is compared to the assigned values, and if one of the company product weights is greater than the assigned weight, that product is the best. Eventually, we can use this process to select the most preferred and best mobile phone model from among all other models. Gray Relational Analysis (GRA) is one of the most popular models, employing a grey co-efficient that estimates the data items by ranking. This model defines a process’s situation or state as black with no information and white with perfect information. In this work, AHP initially assumes criteria weights and assigns rank with the CR (Consistency Ratio) of 1.5%. The criteria weights are re-assigned based on the outcomes, and the CR remains constant as 1.5%. This work also provides an environmental-based attribute access control system, which adds the strength to the system by providing security and the integrity. So, this proposed work performs as a decision support system combined with the security enhancements, and hence it becomes a complete framework to provide a solution to a target application. The novelty of the proposed work is the combination of the crowdsourcing with the recommender system on a secured framework.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.