Umeå University's logo

umu.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 30) Show all publications
Behera, A., Sahoo, K. S., Mishra, T. K. & Bhuyan, M. (2024). A combination learning framework to uncover cyber attacks in IoT networks. Internet of Things: Engineering Cyber Physical Human Systems, 28, Article ID 101395.
Open this publication in new window or tab >>A combination learning framework to uncover cyber attacks in IoT networks
2024 (English)In: Internet of Things: Engineering Cyber Physical Human Systems, E-ISSN 2542-6605, Vol. 28, article id 101395Article in journal (Refereed) Published
Abstract [en]

The Internet of Things (IoT) is rapidly expanding, connecting an increasing number of devices daily. Having diverse and extensive networking and resource-constrained devices creates vulnerabilities to various cyber-attacks. The IoT with the supervision of Software Defined Network (SDN) enhances the network performance through its flexibility and adaptability. Different methods have been employed for detecting security attacks; however, they are often computationally efficient and unsuitable for such resource-constraint environments. Consequently, there is a significant requirement to develop efficient security measures against a range of attacks. Recent advancements in deep learning (DL) models have paved the way for designing effective attack detection methods. In this study, we leverage Genetic Algorithm (GA) with a correlation coefficient as a fitness function for feature selection. Additionally, mutual information (MI) is applied for feature ranking to measure their dependency on the target variable. The selected optimal features were used to train a hybrid DNN model to uncover attacks in IoT networks. The hybrid DNN integrates Convolutional Neural Network, Bi-Gated Recurrent Units (Bi-GRU), and Bidirectional Long Short-Term Memory (Bi-LSTM) for training the input data. The performance of our proposed model is evaluated against several other baseline DL models, and an ablation study is provided. Three key datasets InSDN, UNSW-NB15, and CICIoT 2023 datasets, containing various types of attacks, were used to assess the performance of the model. The proposed model demonstrates an impressive accuracy and detection time over the existing model with lower resource consumption.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Cyber attack, Deep neural network, Feature selection, Genetic algorithm, IoT, SDN
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-231384 (URN)10.1016/j.iot.2024.101395 (DOI)001348976100001 ()2-s2.0-85207358081 (Scopus ID)
Funder
The Kempe Foundations, SMK21-0061Wallenberg AI, Autonomous Systems and Software Program (WASP)EU, Horizon Europe
Available from: 2024-11-04 Created: 2024-11-04 Last updated: 2025-04-24Bibliographically approved
Sahoo, S., Sahoo, K. S., Sahoo, B. & Gandomi, A. H. (2024). A learning automata based edge resource allocation approach for IoT-enabled smart cities. Digital Communications and Networks, 10(5), 1258-1266
Open this publication in new window or tab >>A learning automata based edge resource allocation approach for IoT-enabled smart cities
2024 (English)In: Digital Communications and Networks, ISSN 2468-5925, E-ISSN 2352-8648, Vol. 10, no 5, p. 1258-1266Article in journal (Refereed) Published
Abstract [en]

The development of the Internet of Things (IoT) technology is leading to a new era of smart applications such as smart transportation, buildings, and smart homes. Moreover, these applications act as the building blocks of IoT-enabled smart cities. The high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for processing. However, there is a high computation latency due to the presence of a remote cloud server. Edge computing, which brings the computation close to the data source is introduced to overcome this problem. In an IoT-enabled smart city environment, one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay constraint. An efficient resource allocation at the edge is helpful to address this issue. In this paper, an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation problem. First, we presented a three-layer network architecture for IoT-enabled smart cities. Then, we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization problem. Learning Automata (LA) is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource mapping. An extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.

Place, publisher, year, edition, pages
Elsevier, 2024
Keywords
Edge computing, IoT, Learning automata, Resource allocation, Smart city
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-230972 (URN)10.1016/j.dcan.2023.11.009 (DOI)001367483100001 ()2-s2.0-85206073539 (Scopus ID)
Funder
The Kempe Foundations, SMK21-0061Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-10-28 Created: 2024-10-28 Last updated: 2025-04-24Bibliographically approved
Singh, M., Sahoo, K. S. & Gandomi, A. H. (2024). An intelligent IoT-based data analytics for freshwater recirculating aquaculture system. IEEE Internet of Things Journal, 11(3), 4206-4217
Open this publication in new window or tab >>An intelligent IoT-based data analytics for freshwater recirculating aquaculture system
2024 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 11, no 3, p. 4206-4217Article in journal (Refereed) Published
Abstract [en]

Smart farming is essential for a nation whose economy largely depends on agro products. In the last few years, rapid urbanization and deforestation have impacted farmers. Due to the lack of rainwater harvesting and changing weather patterns, many crop failure cases have been registered in the last few years. To prevent loss of annual crop production, many researchers propose the technology-driven smart farming method. Smart farming is a technology-driven control environment for monitoring and maintaining the crop. Smart farming increases crop production and provides an alternative source of income to small farmers. To promote smart farming in India, the government initiated many pilot projects for integrated aquaculture farming. However, the lack of technological intervention and skill-oriented process makes it difficult for most farmers to succeed in this business. In this paper, we have proposed an intelligent IoT-based freshwater recirculating aquaculture system. The proposed system has integrated sensors and actuators. The sensor system monitors the water parameters, and actuators maintain the aquaculture environment. An intelligent data analytics algorithm played a significant role in monitoring and maintaining the freshwater aquaculture environment. The analytics derived the relationship between the water parameters and identified the relative change. From the experimental evaluation, we have identified that the M5 model tree algorithm has the highest accuracy for monitoring the relative change in water parameters.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Aquacalture, Aquaculture, edge computing, Farming, fog computing, Intelligent sensors, IoT, Monitoring, Production, RAS, Temperature sensors, Water quality
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-215233 (URN)10.1109/JIOT.2023.3298844 (DOI)001166992300130 ()2-s2.0-85173064918 (Scopus ID)
Available from: 2023-10-17 Created: 2023-10-17 Last updated: 2024-04-26Bibliographically approved
Ranjan Senapati, B., Ranjan Swain, R., Mohan Khilar, P., Kumar Bhoi, S. & Sahoo, K. S. (2024). Automatic house location identification using location service based VANET. International Journal of Communication Systems, 37(14), Article ID e5865.
Open this publication in new window or tab >>Automatic house location identification using location service based VANET
Show others...
2024 (English)In: International Journal of Communication Systems, ISSN 1074-5351, E-ISSN 1099-1131, Vol. 37, no 14, article id e5865Article in journal (Refereed) Published
Abstract [en]

The vehicular ad hoc network (VANET) provides a variety of applications and is gaining popularity due to the reuse of network resources. Exact location identification with optimum delay is the demand of all vehicle users. Currently, individuals are utilizing the Global Positioning System (GPS) to ascertain the precise geographical coordinates of a given location. The drawback of GPS technology is its inability to accurately determine location and use GPS in some remote areas. Searching for the location of a particular house randomly incurs a loss of fuel as well as increases delay. This motivates us to propose one automated method through VANET using location service-based routing for the location identification of a house. The proposed work involves searching for the location of a house using the open-source MongoDB database, and the operations on the database are performed using the tool Node-Red. By simulation using SUMO and Network Simulator 2.35, the proposed work is evaluated and compared with existing location service-based routing like geographic location service (GLS) and hierarchical location service (HLS). The proposed work performs better in terms of routing efficiency (end-to-end latency, packet delivery rate), location efficiency (request sends, query success rate, and request travel time), and routing and location overhead (MAC bandwidth consumption). Also, the performance of the proposed work is presented as stable by increasing the number of vehicles. The statistical analysis of the packet delivery ratio and CBR end-to-end latency is carried out using T score.

Place, publisher, year, edition, pages
John Wiley & Sons, 2024
Keywords
GPS, location service, OBU, routing, RSU, VANET
National Category
Communication Systems Computer Sciences
Identifiers
urn:nbn:se:umu:diva-226500 (URN)10.1002/dac.5865 (DOI)001242330400001 ()2-s2.0-85195439992 (Scopus ID)
Available from: 2024-06-19 Created: 2024-06-19 Last updated: 2024-08-20Bibliographically approved
Mishra, K., Majhi, S. K., Sahoo, K. S., Bhoi, S. K., Bhuyan, M. H. & Gandomi, A. H. (2024). Collaborative cloud resource management and task consolidation using JAYA variants. IEEE Transactions on Network and Service Management, 21(6), 6248-6259
Open this publication in new window or tab >>Collaborative cloud resource management and task consolidation using JAYA variants
Show others...
2024 (English)In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537, Vol. 21, no 6, p. 6248-6259Article in journal (Refereed) Published
Abstract [en]

In Cloud-based computing, job scheduling and load balancing are vital to ensure on-demand dynamic resource provisioning. However, reducing the scheduling parameters may affect datacenter performance due to the fluctuating on-demand requests. To deal with the aforementioned challenges, this research proposes a job scheduling algorithm, which is an improved version of a swarm intelligence algorithm. Two approaches, namely linear weight JAYA (LWJAYA) and chaotic JAYA (CJAYA), are implemented to improve the convergence speed for optimal results. Besides, a load-balancing technique is incorporated in line with job scheduling. Dynamically independent and non-pre-emptive jobs were considered for the simulations, which were simulated on two disparate test cases with homogeneous and heterogeneous VMs. The efficiency of the proposed technique was validated against a synthetic and real-world dataset from NASA, and evaluated against several top-of-the-line intelligent optimization techniques, based on the Holms test and Friedman test. Findings of the experiment show that the suggested approach performs better than the alternative approaches.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Cloud computing, Cloud Computing, Convergence, Dynamic scheduling, Heuristic algorithms, JAYA, Job Scheduling, Load Balancing, Load management, Metaheuristics, Resource management, Swarm Intelligence
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-228821 (URN)10.1109/TNSM.2024.3443285 (DOI)001381366600013 ()2-s2.0-85201265246 (Scopus ID)
Available from: 2024-08-27 Created: 2024-08-27 Last updated: 2025-01-13Bibliographically approved
Sardar, A., Umer, S., Rout, R. K., Sahoo, K. S. & Gandomi, A. H. (2024). Enhanced biometric template protection schemes for securing face recognition in IoT environment. IEEE Internet of Things Journal, 11(13), 23196-23206
Open this publication in new window or tab >>Enhanced biometric template protection schemes for securing face recognition in IoT environment
Show others...
2024 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 11, no 13, p. 23196-23206Article in journal (Refereed) Published
Abstract [en]

With the increasing use of biometrics in Internet of Things (IoT) based applications, it is essential to ensure that biometric-based authentication systems are secure. Biometric characteristics can be accessed by anyone, which poses a risk of unauthorized access to the system through spoofed biometric traits. Therefore, it is important to implement secure and efficient security schemes suitable for real-life applications, less computationally intensive, and invulnerable. This work presents a hybrid template protection scheme for secure face recognition in IoT-based environments, which integrates Cancelable Biometrics and Bio-Cryptography. Mainly, the proposed system involves two steps: face recognition and face biometric template protection. The face recognition includes face image preprocessing by the Tree Structure Part Model (TSPM), feature extraction by Ensemble Patch Statistics (EPS) technique, and user classification by multi-class linear support vector machine (SVM). The template protection scheme includes cancelable biometric generation by modified FaceHashing and a Sliding-XOR (called S-XOR) based novel Bio-Cryptographic technique. A user biometric-based key generation technique has been introduced for the employed Bio-Cryptography. Three benchmark facial databases, CVL, FEI, and FERET, have been used for the performance evaluation and security analysis. The proposed system achieves better accuracy for all the databases of 200-dimensional cancelable feature vectors computed from the 500-dimensional original feature vector. The modified FaceHashing and S-XOR method shows superiority over existing face recognition systems and template protection.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Bio-Cryptography, Biological system modeling, Biometrics (access control), Decryption, ElGamal, Encryption, Encryption, Face recognition, FaceHashing, Internet of Things, RC5, RSA, S-XOR, Security, Vehicles
National Category
Computer graphics and computer vision
Identifiers
urn:nbn:se:umu:diva-222650 (URN)10.1109/JIOT.2024.3374229 (DOI)001258244000007 ()2-s2.0-85187997350 (Scopus ID)
Funder
The Kempe Foundations, SMK21-0061Wallenberg AI, Autonomous Systems and Software Program (WASP)
Available from: 2024-04-19 Created: 2024-04-19 Last updated: 2025-04-24Bibliographically approved
Behera, A., Sahoo, K. S., Mishra, T. K., Nayyar, A. & Bilal, M. (2024). Enhancing DDoS detection in SDIoT through effective feature selection with SMOTE-ENN. PLOS ONE, 19(10), Article ID e0309682.
Open this publication in new window or tab >>Enhancing DDoS detection in SDIoT through effective feature selection with SMOTE-ENN
Show others...
2024 (English)In: PLOS ONE, E-ISSN 1932-6203, Vol. 19, no 10, article id e0309682Article in journal (Refereed) Published
Abstract [en]

Internet of things (IoT) facilitates a variety of heterogeneous devices to be enabled with network connectivity via various network architectures to gather and exchange real-time information. On the other hand, the rise of IoT creates Distributed Denial of Services (DDoS) like security threats. The recent advancement of Software Defined-Internet of Things (SDIoT) architecture can provide better security solutions compared to the conventional networking approaches. Moreover, limited computing resources and heterogeneous network protocols are major challenges in the SDIoT ecosystem. Given these circumstances, it is essential to design a low-cost DDoS attack classifier. The current study aims to employ an improved feature selection (FS) technique which determines the most relevant features that can improve the detection rate and reduce the training time. At first, to overcome the data imbalance problem, Edited Nearest Neighbor-based Synthetic Minority Oversampling (SMOTE-ENN) was exploited. The study proposes SFMI, an FS method that combines Sequential Feature Selection (SFE) and Mutual Information (MI) techniques. The top k common features were extracted from the nominated features based on SFE and MI. Further, Principal component analysis (PCA) is employed to address multicollinearity issues in the dataset. Comprehensive experiments have been conducted on two benchmark datasets such as the KDDCup99, CIC IoT-2023 datasets. For classification purposes, Decision Tree, K-Nearest Neighbor, Gaussian Naive Bayes, Random Forest (RF), and Multilayer Perceptron classifiers were employed. The experimental results quantitatively demonstrate that the proposed SMOTE-ENN+SFMI+PCA with RF classifier achieves 99.97% accuracy and 99.39% precision with 10 features.

Place, publisher, year, edition, pages
Public Library of Science (PLoS), 2024
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:umu:diva-232457 (URN)10.1371/journal.pone.0309682 (DOI)001339241200013 ()39418269 (PubMedID)2-s2.0-85206620213 (Scopus ID)
Available from: 2024-12-02 Created: 2024-12-02 Last updated: 2024-12-02Bibliographically approved
Mudgal, A., Verma, A., Singh, M., Sahoo, K. S., Elmroth, E. & Bhuyan, M. (2024). FloRa: flow table low-rate overflow reconnaissance and detection in SDN. IEEE Transactions on Network and Service Management, 21(6), 6670-6683
Open this publication in new window or tab >>FloRa: flow table low-rate overflow reconnaissance and detection in SDN
Show others...
2024 (English)In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537, Vol. 21, no 6, p. 6670-6683Article in journal (Refereed) Published
Abstract [en]

SDN has evolved to revolutionize next-generation networks, offering programmability for on-the-fly service provisioning, primarily supported by the OpenFlow (OF) protocol. The limited storage capacity of Ternary Content Addressable Memory (TCAM) for storing flow tables in OF switches introduces vulnerabilities, notably the Low-Rate Flow Table Overflow (LOFT) attacks. LOFT exploits the flow table’s storage capacity by occupying a substantial amount of space with malicious flow, leading to a gradual degradation in the flow-forwarding performance of OF switches. To mitigate this threat, we propose FloRa, a machine learning-based solution designed for monitoring and detecting LOFT attacks in SDN. FloRa continuously examines and determines the status of the flow table by closely examining the features of the flow table entries. When suspicious activity is identified, FloRa promptly activates the machine-learning based detection module. The module monitors flow properties, identifies malicious flows, and blacklists them, facilitating their eviction from the flow table. Incorporating novel features such as Packet Arrival Frequency, Content Relevance Score, and Possible Spoofed IP along with Cat Boost employed as the attack detection method. The proposed method reduces CPU overhead, memory overhead, and classification latency significantly and achieves a detection accuracy of 99.49% which is more than the state-of-the-art methods to the best of our knowledge. This approach not only protects the integrity of the flow tables but also guarantees the uninterrupted flow of legitimate traffic. Experimental results indicate the effectiveness of FloRa in LOFT attack detection, ensuring uninterrupted data forwarding and continuous availability of flow table resources in SDN.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Control systems, Degradation, Denial-of-service attack, Feature extraction, Flora, flow table overflow, low-rate attack, Prevention and mitigation, Protocols, SDN
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-229374 (URN)10.1109/TNSM.2024.3446178 (DOI)001381366600022 ()2-s2.0-85201789065 (Scopus ID)
Funder
The Kempe Foundations, SMK21-0061Wallenberg AI, Autonomous Systems and Software Program (WASP)Knut and Alice Wallenberg FoundationEU, Horizon Europe
Available from: 2024-09-13 Created: 2024-09-13 Last updated: 2025-01-13Bibliographically approved
Mohapatra, S., Mohanty, S., Maharana, S. K., Dash, A. & Sahoo, K. S. (2024). GAGSA: a hybrid approach for load balancing in cloud environment. In: Umakanta Nanda; Asis Kumar Tripathy; Jyoti Prakash Sahoo; Mahasweta Sarkar; Kuan-Ching Li (Ed.), Advances in distributed computing and machine learning: proceedings of ICADCML 2024, volume 1. Paper presented at 5th International Conference on Advances in Distributed Computing and Machine Learning, ICADCML 2024, Amaravati, India, January 5-6, 2024 (pp. 317-324). Singapore: Springer
Open this publication in new window or tab >>GAGSA: a hybrid approach for load balancing in cloud environment
Show others...
2024 (English)In: Advances in distributed computing and machine learning: proceedings of ICADCML 2024, volume 1 / [ed] Umakanta Nanda; Asis Kumar Tripathy; Jyoti Prakash Sahoo; Mahasweta Sarkar; Kuan-Ching Li, Singapore: Springer, 2024, p. 317-324Conference paper, Published paper (Refereed)
Abstract [en]

Cloud computing is widely being used by researchers’ academia and industry for its abundant opportunities. Different technologies such as Internet of Things, Edge Computing, and Fog Computing are gradually integrating with the cloud platform due to its scalability and availability. The number of cloud users is also increasing exponentially. The requests generated from wide range of users are random. Executions of request and providing the quality of service are one of the promising issues in cloud environment. Optimization of response time and commutation cost is the major concern in cloud environment. Researchers have proposed many heuristics, meta-heuristic approaches for solving the load balancing issues in cloud platform. In this paper, authors have proposed a hybrid approach for load balancing in cloud computing using genetic algorithm with gravitational search algorithm. Simulations are carried out using cloud Sim Simulator and comparisons are made with other competitive approaches to evaluate the performance of the system. It is observed that the hybrid approach outperforms in various measures.

Place, publisher, year, edition, pages
Singapore: Springer, 2024
Series
Lecture Notes in Networks and Systems (LNNS), ISSN 2367-3370, E-ISSN 2367-3389 ; 955
Keywords
Average response time, Cloud computing, Computation cost, Genetic algorithm, Gravitational search, Load balancing
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:umu:diva-227915 (URN)10.1007/978-981-97-1841-2_24 (DOI)2-s2.0-85197852225 (Scopus ID)9789819718405 (ISBN)9789819718412 (ISBN)
Conference
5th International Conference on Advances in Distributed Computing and Machine Learning, ICADCML 2024, Amaravati, India, January 5-6, 2024
Available from: 2024-07-18 Created: 2024-07-18 Last updated: 2024-07-18Bibliographically approved
Rathor, V. S., Singh, M., Sahoo, K. S. & Mohanty, S. P. (2024). Gatelock: input-dependent key-based locked gates for sat resistant logic locking. IEEE Transactions on Very Large Scale Integration (vlsi) Systems, 32(2), 361-371
Open this publication in new window or tab >>Gatelock: input-dependent key-based locked gates for sat resistant logic locking
2024 (English)In: IEEE Transactions on Very Large Scale Integration (vlsi) Systems, ISSN 1063-8210, E-ISSN 1557-9999, Vol. 32, no 2, p. 361-371Article in journal (Refereed) Published
Abstract [en]

Logic locking has become a robust method for reducing the risk of intellectual property (IP) piracy, overbuilding, and hardware Trojan threats throughout the lifespan of integrated circuits (ICs). Nevertheless, the majority of reported logic locking approaches are susceptible to satisfiability (SAT)-based attacks. The existing SAT-resistant logic locking methods provide a tradeoff between security and effectiveness and require a significant design overhead. In this article, a novel gate replacement-based input-dependent key-based logic locking (IDKLL) technique is proposed. We first introduce the concept of IDKLL, and how the IDKLL can mitigate the SAT attacks completely. Unlike conventional logic locking, the IDKLL approach uses multiple key sequences (KSs) (instead of a single KS) as the correct key to lock/unlock the design functionality for all inputs. Based on this IDKLL concept, we developed several locked gates. Further, we propose a lightweight gate replacement-based IDKLL called GateLock that locks the design by replacing exciting gates with their respective IDKLL-based locked gates. The security analysis of the proposed method shows that it prevents the SAT attack completely and forces the attacker to apply a significantly large number of brute-force attempts to decipher the key. The experimental evaluation on International Symposium on Circuits and Systems (ISCAS) and International Test Conference (ITC) benchmarks shows that the proposed GateLock method completely prevents the SAT-based attacks and requires an average of 56.7%, 72.7%, and 87.8% reduced area, power, and delay compared to cascaded locking (CAS-Lock) and strong Anti-SAT (SAS) approaches.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Anti-satisfiability (SAT), Hardware, hardware Trojan, Intellectual property, intellectual property (IP), IP piracy, IP protection, Logic gates, logic locking, Resistance, SAT-attack, Security, Synthetic aperture sonar, Trojan horses
National Category
Computer Sciences
Identifiers
urn:nbn:se:umu:diva-219534 (URN)10.1109/TVLSI.2023.3340350 (DOI)001137324700001 ()2-s2.0-85181578156 (Scopus ID)
Available from: 2024-01-19 Created: 2024-01-19 Last updated: 2025-04-24Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-6435-5738

Search in DiVA

Show all publications