Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks to satisfy. The limitations of 5G networks have been apparent with the deployment of more and more 5G networks, which certainly encourages the investigation of 6G networks as the answer for the future. This research includes fundamental privacy and security issues related to 6G technology. Keeping an eye on real-time systems requires secure wireless sensor networks (WSNs). Denial of service (DoS) attacks mark a significant security vulnerability that WSNs face, and they can compromise the system as a whole. This research proposes a novel method in blockchain 6G-based wireless network security management and optimization using a machine learning model. In this research, the deployed 6G wireless sensor network security management is carried out using a blockchain user datagram transport protocol with reinforcement projection regression. Then, the network optimization is completed using artificial democratic cuckoo glowworm remora optimization. The simulation results have been based on various network parameters regarding throughput, energy efficiency, packet delivery ratio, end-end delay, and accuracy. In order to minimise network traffic, it also offers the capacity to determine the optimal node and path selection for data transmission. The proposed technique obtained 97% throughput, 95% energy efficiency, 96% accuracy, 50% end-end delay, and 94% packet delivery ratio.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11435844PMC
http://dx.doi.org/10.3390/s24186143DOI Listing

Publication Analysis

Top Keywords

network security
12
security management
12
blockchain 6g-based
8
6g-based wireless
8
wireless network
8
management optimization
8
optimization machine
8
machine learning
8
wireless sensor
8
energy efficiency
8

Similar Publications

Background And Objectives: Older adults living with dementia are a heterogeneous group, which can make studying optimal medication management challenging. Unsupervised machine learning is a group of computing methods that rely on unlabeled data-that is, where the algorithm itself is discovering patterns without the need for researchers to label the data with a known outcome. These methods may help us to better understand complex prescribing patterns in this population.

View Article and Find Full Text PDF

The future European Health Data Space (EHDS), a network for secure cross-border data use, could be beneficial for public health initiatives. The HealthData@EU pilot project evaluated possibilities of secondary data use based on five use cases and established a pilot IT infrastructure. This article reports overarching experiences from two public health use cases and the IT development.

View Article and Find Full Text PDF

The increasing dependence on cloud computing as a cornerstone of modern technological infrastructures has introduced significant challenges in resource management. Traditional load-balancing techniques often prove inadequate in addressing cloud environments' dynamic and complex nature, resulting in suboptimal resource utilization and heightened operational costs. This paper presents a novel smart load-balancing strategy incorporating advanced techniques to mitigate these limitations.

View Article and Find Full Text PDF

At present, significant progress has been made in the research of image encryption, but there are still some issues that need to be explored in key space, password generation and security verification, encryption schemes, and other aspects. Aiming at this, a digital image encryption algorithm was developed in this paper. This algorithm integrates six-dimensional cellular neural network with generalized chaos to generate pseudo-random numbers to generate the plaintext-related ciphers.

View Article and Find Full Text PDF

As a dual-purpose medicinal and edible plant, Ocimum species offer significant pharmacological potential through their alkaloid metabolites. This study comprehensively analyzed alkaloid profiles in 10 Ocimum accessions using ultra performance liquid chromatography-tandem mass spectrometry (UPLC-MS/MS), integrated with network pharmacology, molecular docking, and transcriptome sequencing to elucidate key pharmacological targets, therapeutic potentials, and biosynthetic pathways. We identified 191 alkaloids categorized into eight classes, with phenolamine and plumerane alkaloids predominating.

View Article and Find Full Text PDF