Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Collect Spatiotemporally Correlated Data In Iot Networks With An Energy-Constrained Uav, Wenzheng Xu, Heng Shao, Qunli Shen, Jian Peng, Wen Huang, Weifa Liang, Tang Liu, Xin Wei Yao, Tao Lin, Sajal K. Das Jan 2024

Collect Spatiotemporally Correlated Data In Iot Networks With An Energy-Constrained Uav, Wenzheng Xu, Heng Shao, Qunli Shen, Jian Peng, Wen Huang, Weifa Liang, Tang Liu, Xin Wei Yao, Tao Lin, Sajal K. Das

Computer Science Faculty Research & Creative Works

UAVs (Unmanned Aerial Vehicles) Are Promising Tools For Efficient Data Collections Of Sensors In IoT Networks. Existing Studies Exploited Both Spatial And Temporal Data Correlations To Reduce The Amount Of Collected Redundant Data, In Which Sensors Are First Partitioned Into Different Clusters, A Master Sensor In Each Cluster Then Collects Raw Data From Other Sensors And Compresses The Received Data. An Energy-Constrained UAV Finally Collects The Maximum Amount Of Compressed Data From Different Master Sensors. We However Notice That The Compressed Data From Only A Portion Of Clusters Are Collected By The UAV In The Existing Studies, While The Data …


Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen Jan 2024

Using Feature Selection Enhancement To Evaluate Attack Detection In The Internet Of Things Environment, Khawlah Harahsheh, Rami Al-Naimat, Chung-Hao Chen

Electrical & Computer Engineering Faculty Publications

The rapid evolution of technology has given rise to a connected world where billions of devices interact seamlessly, forming what is known as the Internet of Things (IoT). While the IoT offers incredible convenience and efficiency, it presents a significant challenge to cybersecurity and is characterized by various power, capacity, and computational process limitations. Machine learning techniques, particularly those encompassing supervised classification techniques, offer a systematic approach to training models using labeled datasets. These techniques enable intrusion detection systems (IDSs) to discern patterns indicative of potential attacks amidst the vast amounts of IoT data. Our investigation delves into various aspects …