The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the surveillance data in smart cities using the current cellular networks. However, due to the openness of communication channel and battery operations, the drones and the sensitive data collected through drones are subject to many security threats. To cope the security challenges, recently, Srinivas et al. proposed a temporal credential based anonymous lightweight authentication scheme (TCALAS) for IoD networks. Contrary to the IoD monitoring framework proposed by Srinivas et al., their own scheme can work only when there is one and only one cluster/flying zone and is not scalable. Moreover, despite their claim of robustness, the investigation in this paper reveals that Srinivas et al.'s scheme cannot resist traceability and stolen verifier attacks. Using the lightweight symmetric key primitives and temporal credentials, an improved scheme (iTCALAS) is then proposed. The proposed scheme while maintaining the lightweightness provides security against many known attacks including traceability and stolen verifier. The proposed iTCALAS extends scalability and can work when there are several flying zone/clusters in the IoD environment. The formal security proof along with automated verification using ProVerif show robustness of proposed iTCALAS. Moreover, the security discussion and performance comparisons show that the iTCALAS provides the known security features and completes authentication in just 2.295 ms.
The number of vehicles on the roads has increased proportionally over the last couple of years and this number is likely to rise due to the increase in population growth and the number of vehicles that are manufacturing every day. This high traffic density leads to several problems, from which effectively disseminating the emergency messages is a major concern. Keeping in view the dynamic characteristics of VANETs, significant challenges are faced in disseminating the message across the network. The major challenges are the broadcast storm problem, hidden node problem and the packet collision. Many studies have been performed to devise an effective and reliable mechanism for disseminating emergency messages in a Vehicular ad-Hoc Network (VANET). Researchers have proposed different models to tackle various types of scenarios for emergency message dissemination. This paper not only reviews some recent contributions to emergency message dissemination in vehicular networks but also discusses various proposed methods based on Intelligent Transportation System (ITS), Internet of Things (IoT), Priority messaging, Clustering approach, Software Defined Network (SDN) and Fog Computing. We have also tried to explore the latest developments in emergency message dissemination using 5G networks.
Controlling infectious diseases is a major health priority because they can spread and infect humans, thus evolving into epidemics or pandemics. Therefore, early detection of infectious diseases is a significant need, and many researchers have developed models to diagnose them in the early stages. This paper reviewed research articles for recent machine-learning (ML) algorithms applied to infectious disease diagnosis. We searched the Web of Science, ScienceDirect, PubMed, Springer, and IEEE databases from 2015 to 2022, identified the pros and cons of the reviewed ML models, and discussed the possible recommendations to advance the studies in this field. We found that most of the articles used small datasets, and few of them used real-time data. Our results demonstrated that a suitable ML technique depends on the nature of the dataset and the desired goal. Moreover, heterogeneous data could ensure the model’s generalization, while big data, many features, and a hybrid model will increase the resulting performance. Furthermore, using other techniques such as deep learning and NLP to extract vast features from unstructured data is a powerful approach to enhancing the performance of ML diagnostic models.
In wireless sensor networks, the sensors transfer data through radio signals to a remote base station. Sensor nodes are used to sense environmental conditions such as temperature, strain, humidity, sound, vibration, and position. Data security is a major issue in wireless sensor networks since data travel over the naturally exposed wireless channel where malicious attackers may get access to critical information. The sensors in wireless sensor networks are resource-constrained devices whereas the existing data security approaches have complex security mechanisms with high computational and response times affecting the network lifetime. Furthermore, existing systems, such as secure efficient encryption algorithm, use the Diffie–Hellman approach for key generation and exchange; however, Diffie–Hellman is highly vulnerable to the man-in-the-middle attack. This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. The Diffie–Hellman has been modified to secure it against attacks by generating a hash of each value that is transmitted over the network. The proposed approach has been analyzed for security against various attacks. Furthermore, it has also been analyzed in terms of encryption/decryption time, computation time, and key generation time for different sizes of data. The comparative analysis with the existing approaches shows that the proposed approach performs better in most of the cases.
Dyslexia is a neurological problem that leads to obstacles and difficulties in the learning process, especially in reading. Generally, people with dyslexia suffer from weak reading, writing, spelling, and fluency abilities. However, these difficulties are not related to their intelligence. An early diagnosis of this disorder will help dyslexic children improve their abilities using appropriate tools and specialized software. Machine learning and deep learning methods have been implemented to recognize dyslexia with various datasets related to dyslexia acquired from medical and educational organizations. This review paper analyzed the prediction performance of deep learning models for dyslexia and summarizes the challenges researchers face when they use deep learning models for classification and diagnosis. Using the PRISMA protocol, 19 articles were reviewed and analyzed, with a focus on data acquisition, preprocessing, feature extraction, and the prediction model performance. The purpose of this review was to aid researchers in building a predictive model for dyslexia based on available dyslexia-related datasets. The paper demonstrated some challenges that researchers encounter in this field and must overcome.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.