Anna Davidovic, Catherine V. Talbot, C. Hamilton-Giachritsis, A. Joinson
Incidents of online harassment are increasing and can have significant consequences for victims. Witnesses (“digital bystanders”) can be crucial in identifying and challenging harassment. This study considered when and how young adults intervene online, with the aim of understanding the applicability of existing theoretical models (i.e., Bystander Intervention Model; Response Decision-Making Framework). Thematic analysis of eight focus groups (UK community sample, N = 67, 18–25 years) resulted in five themes: Noticing and Interpreting the Harassment, Perceived Responsibility for Helping, Consequences of Intervening, Perceived Ability to Make a Difference, and Deciding How to Help. The online context amplified offline preferences, such as greater preference for anonymity and perceived costs of intervention (e.g., social costs). Intervention strategies varied in visibility and effort, preferring “indirect” micro-interventions focused on supporting victims. A new, merged model specific to digital bystanders is proposed, with implications for the design and messaging on social networking sites discussed.
{"title":"To intervene or not to intervene: young adults' views on when and how to intervene in online harassment","authors":"Anna Davidovic, Catherine V. Talbot, C. Hamilton-Giachritsis, A. Joinson","doi":"10.1093/jcmc/zmad027","DOIUrl":"https://doi.org/10.1093/jcmc/zmad027","url":null,"abstract":"\u0000 Incidents of online harassment are increasing and can have significant consequences for victims. Witnesses (“digital bystanders”) can be crucial in identifying and challenging harassment. This study considered when and how young adults intervene online, with the aim of understanding the applicability of existing theoretical models (i.e., Bystander Intervention Model; Response Decision-Making Framework). Thematic analysis of eight focus groups (UK community sample, N = 67, 18–25 years) resulted in five themes: Noticing and Interpreting the Harassment, Perceived Responsibility for Helping, Consequences of Intervening, Perceived Ability to Make a Difference, and Deciding How to Help. The online context amplified offline preferences, such as greater preference for anonymity and perceived costs of intervention (e.g., social costs). Intervention strategies varied in visibility and effort, preferring “indirect” micro-interventions focused on supporting victims. A new, merged model specific to digital bystanders is proposed, with implications for the design and messaging on social networking sites discussed.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73073109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12720/jcm.18.8.481-488
Solichah Larasati, Khoirun Ni’amah, Reni Dyah Wahyuningrum, A. Hikmaturokhman
—In the super-dense future network communication, human and machine communications are mixed in a single network. They will trespass each other and could lead to an intersection. This paper develops Coded Random Access (CRA) using Maximum Distance Sparable (MDS) codes as a multiple access scheme to serve millions of users, covering human and machines. This research aims to maximum number of user human and machines, where the priority access is given to the human. Two keywords of CRA, i.e., coding (solved by optimal degree distributions) and random. To analyze design degree distribution using Extrinsic Information Transfer (EXIT) Chart projection under binary erasure channels (BEC). The priority scheme for human communications is determined based on utility functions. The parameters used to see the performance of the EXIT chart are packet-loss-rate (PLR) and throughput. Based on the results, the degree design has succeeded in prioritizing humans, which is indicated by the small PLR value but large throughput, as well as the EXIT curve with its very small gap.
{"title":"Design of Degree Distribution with Maximum Distance Separable Codes for User Priority","authors":"Solichah Larasati, Khoirun Ni’amah, Reni Dyah Wahyuningrum, A. Hikmaturokhman","doi":"10.12720/jcm.18.8.481-488","DOIUrl":"https://doi.org/10.12720/jcm.18.8.481-488","url":null,"abstract":"—In the super-dense future network communication, human and machine communications are mixed in a single network. They will trespass each other and could lead to an intersection. This paper develops Coded Random Access (CRA) using Maximum Distance Sparable (MDS) codes as a multiple access scheme to serve millions of users, covering human and machines. This research aims to maximum number of user human and machines, where the priority access is given to the human. Two keywords of CRA, i.e., coding (solved by optimal degree distributions) and random. To analyze design degree distribution using Extrinsic Information Transfer (EXIT) Chart projection under binary erasure channels (BEC). The priority scheme for human communications is determined based on utility functions. The parameters used to see the performance of the EXIT chart are packet-loss-rate (PLR) and throughput. Based on the results, the degree design has succeeded in prioritizing humans, which is indicated by the small PLR value but large throughput, as well as the EXIT curve with its very small gap.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"41 1","pages":"481-488"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84696370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12720/jcm.18.8.522-536
Tagnon P. Okoumassoun, Anita Antwiwaa, N. K. Gerrar
— Recent developments in various applications have led to the rapid growth in demand for bandwidth by users. It has enhanced the need for solutions that provide abundant bandwidth at a reduced cost. Radio-over-fibre (RoF) enables simpler and more efficient transmission of communication signals compared to traditional radio frequency (RF) methods.
{"title":"Performance Evaluation of Optical Amplifiers in a Hybrid RoF-WDM Communication System","authors":"Tagnon P. Okoumassoun, Anita Antwiwaa, N. K. Gerrar","doi":"10.12720/jcm.18.8.522-536","DOIUrl":"https://doi.org/10.12720/jcm.18.8.522-536","url":null,"abstract":"— Recent developments in various applications have led to the rapid growth in demand for bandwidth by users. It has enhanced the need for solutions that provide abundant bandwidth at a reduced cost. Radio-over-fibre (RoF) enables simpler and more efficient transmission of communication signals compared to traditional radio frequency (RF) methods.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"37 1","pages":"522-536"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83641909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12720/jcm.18.8.471-480
Mohamed Najmus Saqhib, Lakshmikanth S.
—The prospective integration of Wireless Sensor Networks (WSNs) with the Internet of Things (IoT) in pivotal domains underscores the paramount significance of preserving the network lifespan. Notwithstanding, traditional algorithms evince insufficient energy conservation, necessitating an innovative approach to enhance the energy efficiency of WSN. The research presents a novel sink-initiated decentralized routing framework that enhances network lifespan and mitigates energy consumption by utilizing routing-centric parameters and fuzzy logic. The approach is based on an energy-conscious model that selects initiator nodes from 1-hop neighbors for multiple path formation, thereby damping redundancy in the network. To boost the quality-of-service, forward relay node is chosen amalgamating significant parameters including the total residual energy, radio link quality between the consecutive nodes, and distance to the sink. A fuzzy inference mechanism has been devised to discern the preeminent trajectory from a plethora of possible routes. The mechanism employs discerning descriptors such as End to End latency, link caliber, and progressive advancement towards the sink, to ascertain the path most appropriate for the task at hand. The proposed model called Energy Aware Data Centric Query Driven Receiver initiated (EADQR) routing protocol excels over the conventional methods like AOMDV, OLSR, ZRP and EEDR with increased network throughput, substantial energy utilization and improved rate of packet delivery across all iterations. EADQR outperforms OLSR by 94%, AOMDV by 93%, ZRP by 97%, and EEDR by 87% in terms of network lifetime.
{"title":"A Non-hierarchical Multipath Routing Protocol Using Fuzzy Logic for Optimal Network Lifetime in Wireless Sensor Network","authors":"Mohamed Najmus Saqhib, Lakshmikanth S.","doi":"10.12720/jcm.18.8.471-480","DOIUrl":"https://doi.org/10.12720/jcm.18.8.471-480","url":null,"abstract":"—The prospective integration of Wireless Sensor Networks (WSNs) with the Internet of Things (IoT) in pivotal domains underscores the paramount significance of preserving the network lifespan. Notwithstanding, traditional algorithms evince insufficient energy conservation, necessitating an innovative approach to enhance the energy efficiency of WSN. The research presents a novel sink-initiated decentralized routing framework that enhances network lifespan and mitigates energy consumption by utilizing routing-centric parameters and fuzzy logic. The approach is based on an energy-conscious model that selects initiator nodes from 1-hop neighbors for multiple path formation, thereby damping redundancy in the network. To boost the quality-of-service, forward relay node is chosen amalgamating significant parameters including the total residual energy, radio link quality between the consecutive nodes, and distance to the sink. A fuzzy inference mechanism has been devised to discern the preeminent trajectory from a plethora of possible routes. The mechanism employs discerning descriptors such as End to End latency, link caliber, and progressive advancement towards the sink, to ascertain the path most appropriate for the task at hand. The proposed model called Energy Aware Data Centric Query Driven Receiver initiated (EADQR) routing protocol excels over the conventional methods like AOMDV, OLSR, ZRP and EEDR with increased network throughput, substantial energy utilization and improved rate of packet delivery across all iterations. EADQR outperforms OLSR by 94%, AOMDV by 93%, ZRP by 97%, and EEDR by 87% in terms of network lifetime.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"58 1","pages":"471-480"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83935985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12720/jcm.18.8.489-503
Michael Agyare, J. J. Kponyo, K. A. Opare, K. Gyasi
.
.
{"title":"An Optimized Vertical Handover Decision Model for the Heterogeneous DSRC/LTE Vehicular Networks","authors":"Michael Agyare, J. J. Kponyo, K. A. Opare, K. Gyasi","doi":"10.12720/jcm.18.8.489-503","DOIUrl":"https://doi.org/10.12720/jcm.18.8.489-503","url":null,"abstract":".","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"52 1","pages":"489-503"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82252596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.12720/jcm.18.8.504-513
Imelda Uli, Vistalina Simanjuntak, A. Kurniawan
— Power Domain Non-Orthogonal Multiple Access (PD-NOMA) is one of the multiple access schemes that increase a channel capacity by focusing on the downlink side. This study stems from the facilitation of various narrow and sharp beams with a high gain and directivity, so the users can maximize each of the sharp beams and have higher power efficiency. The higher the power efficiency is, the higher the throughput will be since it is directly proportional to the increased channel capacity. This study employs an edge weight to design the arrangement of a planar microstrip antenna with the uniformly-spaced N elements (λ/2). The antenna design starts from 1x3 to 1x6, and it will produce a multi-beam pattern with a 5G 2.6-GHz operating frequency. Each patch is separated by λ /2 employing a parasitic and a non-parasitic patch, with the value of S 11 amounting to below -20 dB. There is a novelty in this study in that it is found out that the characteristic of the number of the main lobes for the antenna’s even number is N+1, and the characteristic of the number of the main lobes for the antenna’s odd number is N. With the multi-beam characteristics that are narrow and sharp, the gain and directivity values are getting higher. Furthermore, the parasitic patches or no parasitic patches only affect the side lobe and do not significantly affect the main lobe.
{"title":"Effect of Parasitic Patch for the Radiation Characteristics Microstrip Antenna Planar Array with Distribution Edge","authors":"Imelda Uli, Vistalina Simanjuntak, A. Kurniawan","doi":"10.12720/jcm.18.8.504-513","DOIUrl":"https://doi.org/10.12720/jcm.18.8.504-513","url":null,"abstract":"— Power Domain Non-Orthogonal Multiple Access (PD-NOMA) is one of the multiple access schemes that increase a channel capacity by focusing on the downlink side. This study stems from the facilitation of various narrow and sharp beams with a high gain and directivity, so the users can maximize each of the sharp beams and have higher power efficiency. The higher the power efficiency is, the higher the throughput will be since it is directly proportional to the increased channel capacity. This study employs an edge weight to design the arrangement of a planar microstrip antenna with the uniformly-spaced N elements (λ/2). The antenna design starts from 1x3 to 1x6, and it will produce a multi-beam pattern with a 5G 2.6-GHz operating frequency. Each patch is separated by λ /2 employing a parasitic and a non-parasitic patch, with the value of S 11 amounting to below -20 dB. There is a novelty in this study in that it is found out that the characteristic of the number of the main lobes for the antenna’s even number is N+1, and the characteristic of the number of the main lobes for the antenna’s odd number is N. With the multi-beam characteristics that are narrow and sharp, the gain and directivity values are getting higher. Furthermore, the parasitic patches or no parasitic patches only affect the side lobe and do not significantly affect the main lobe. ","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"1 1","pages":"504-513"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80421189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12720/jcm.18.7.446-452
Ambreen Memon, Jeff Kilby, Rashmi Munjal, M. E. Villapol
With the ever-growing popularity of smartphones, new services are emerging where the local and positioning aspects become more important. Additionally, new routing algorithms are being developed based on various networking technology such as Delay Tolerance Networks (DTN), Deviceto- Device communication, Opportunistic Network, etc. DTN is categorized as stable and unstable, a continuous path between the source and the destination node. Here, communication is done by carrying the message through the intermediate relay node on the store and carry forward paradigm. In this work, a Sustainable Energy Delay Tolerance Approach (SEDA) considers nodes mobility patterns for energy-efficient data transmission. This routing model is based on the appropriate usage of node information along with node mobility and its contacts for data dissemination. Next step is applying some techniques to predict the most likely position for next encounter. We will design and implement a social relation-aware routing relation-awareness the social relation as a part of the routing matrix. We assume that most of the movement of nodes are included in various numbers of social contacts; therefore, there is a higher probability of message delivery to the destination. Simulation results show that the proposed routing protocol improves the delivery ratio by reducing network size and distance, which also impacts energy saving.
{"title":"Sustainable Next-Generation Network Design using Social Aware and Delay Tolerant Approach","authors":"Ambreen Memon, Jeff Kilby, Rashmi Munjal, M. E. Villapol","doi":"10.12720/jcm.18.7.446-452","DOIUrl":"https://doi.org/10.12720/jcm.18.7.446-452","url":null,"abstract":"With the ever-growing popularity of smartphones, new services are emerging where the local and positioning aspects become more important. Additionally, new routing algorithms are being developed based on various networking technology such as Delay Tolerance Networks (DTN), Deviceto- Device communication, Opportunistic Network, etc. DTN is categorized as stable and unstable, a continuous path between the source and the destination node. Here, communication is done by carrying the message through the intermediate relay node on the store and carry forward paradigm. In this work, a Sustainable Energy Delay Tolerance Approach (SEDA) considers nodes mobility patterns for energy-efficient data transmission. This routing model is based on the appropriate usage of node information along with node mobility and its contacts for data dissemination. Next step is applying some techniques to predict the most likely position for next encounter. We will design and implement a social relation-aware routing relation-awareness the social relation as a part of the routing matrix. We assume that most of the movement of nodes are included in various numbers of social contacts; therefore, there is a higher probability of message delivery to the destination. Simulation results show that the proposed routing protocol improves the delivery ratio by reducing network size and distance, which also impacts energy saving.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"18 1","pages":"446-452"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81771550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12720/jcm.18.7.424-434
K. P, Usha Rani K.R.
Orthogonal Frequency Division Multiplexing (OFDM) based mixed numerology scheme and Non-Orthogonal Multiple Access (NOMA) are the two important key features of 5G radio standard capable of handling diversified service requirements. However, the mixed numerology scheme suffers from an inherent problem called Inter Numerology Interference (INI) that arises due to non-orthogonality issue between any two numerologies, whereas NOMA suffers from potential Bit Error Rate (BER). In this research work, transmitter architecture based on windowing and pre-coding techniques to mitigate the INI and two receiver architectures based on the principle of Successive Interference Cancellation (SIC) and Combined Maximum Likelihood (CDML) decoding are proposed for optimal decoding of the information. The proposed system model is designed to operate under mixed numerology NOMA scenario. The BER performance analysis is done for both the receivers and compared with each other and the conclusive remarks are drawn.
{"title":"Precoder Based Transceivers Design for Non-Orthogonal Multiple Access Mixed Numerologies","authors":"K. P, Usha Rani K.R.","doi":"10.12720/jcm.18.7.424-434","DOIUrl":"https://doi.org/10.12720/jcm.18.7.424-434","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) based mixed numerology scheme and Non-Orthogonal Multiple Access (NOMA) are the two important key features of 5G radio standard capable of handling diversified service requirements. However, the mixed numerology scheme suffers from an inherent problem called Inter Numerology Interference (INI) that arises due to non-orthogonality issue between any two numerologies, whereas NOMA suffers from potential Bit Error Rate (BER). In this research work, transmitter architecture based on windowing and pre-coding techniques to mitigate the INI and two receiver architectures based on the principle of Successive Interference Cancellation (SIC) and Combined Maximum Likelihood (CDML) decoding are proposed for optimal decoding of the information. The proposed system model is designed to operate under mixed numerology NOMA scenario. The BER performance analysis is done for both the receivers and compared with each other and the conclusive remarks are drawn.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"91 1","pages":"424-434"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85487608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12720/jcm.18.7.462-470
Nurul Saliha A. Ibrahim, F. A. Saparudin
Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. In the vast nature of the Internet of Things (IoT) network, UAVs could work as Aerial Gateway (AG) for communications among low-powered and distributed ground IoT Devices (IDs). This research concentrates on the path planning and deployment system that may facilitate decisionmaking and guaranteed resource-efficient UAV mission assignment in serving ground IDs. Due to limited resources, it is essential to take into account several factors when designing such a system, including the AG flight time, the coverage radius, and the ground-to-air system's achievable data rate. As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. The outcome demonstrates that, in terms of total flight distance, EECPP outperforms Close Enough Traveling Salesman Problem (CETSP) by 19.99%. EECPP reduced energy usage by an average of 56.15% as opposed to Energy-Efficient Path Planning (E2PP). Due to its mobility nature with the addition of effective path planning, the AG is able to hover at each stop point, making it ideal for usage in crowded regions with high demand, emergency circumstances, and distant locations with no access to fixed base stations.
{"title":"Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway","authors":"Nurul Saliha A. Ibrahim, F. A. Saparudin","doi":"10.12720/jcm.18.7.462-470","DOIUrl":"https://doi.org/10.12720/jcm.18.7.462-470","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. In the vast nature of the Internet of Things (IoT) network, UAVs could work as Aerial Gateway (AG) for communications among low-powered and distributed ground IoT Devices (IDs). This research concentrates on the path planning and deployment system that may facilitate decisionmaking and guaranteed resource-efficient UAV mission assignment in serving ground IDs. Due to limited resources, it is essential to take into account several factors when designing such a system, including the AG flight time, the coverage radius, and the ground-to-air system's achievable data rate. As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. The outcome demonstrates that, in terms of total flight distance, EECPP outperforms Close Enough Traveling Salesman Problem (CETSP) by 19.99%. EECPP reduced energy usage by an average of 56.15% as opposed to Energy-Efficient Path Planning (E2PP). Due to its mobility nature with the addition of effective path planning, the AG is able to hover at each stop point, making it ideal for usage in crowded regions with high demand, emergency circumstances, and distant locations with no access to fixed base stations.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"65 1","pages":"462-470"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74770611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-01DOI: 10.12720/jcm.18.7.398-423
L. Qabajeh
Mobile Ad-Hoc Networks (MANET) are self-organized wireless networks that are becoming progressively popular. Determining an efficient route leading from a source to a specific destination in these networks is an essential issue since nodes are continuously moving. Furthermore, finding a secure route is a difficult area to deal with since adversaries might insert themselves into these routes unless a strict secure routing procedure is implemented. In this paper, a novel scalable secure routing protocol called S-Octopus has been proposed. Via dividing the network area into sectors and utilizing restricted directional flooding, our protocol intents to achieve improved scalability. Moreover, S-Octopus seeks to enhance robustness against the single point of failure and compromise by introducing several Sector Certificate Authority servers. Together with S-Octopus a location service and a misbehavior detection system have been proposed. Using GloMoSim simulator, S-Octopus security and performance have been evaluated and compared with the basic Authenticated Routing for Ad-Hoc Networks (ARAN) as well as Zone-based Authenticated Routing for Ad-Hoc Networks (ARANz). Simulation results assure that S-Octopus is able to effectively initiate and maintain secure routes in MANETs. Results also confirm that S-Octopus has significantly mitigated the scalability problem by achieving the maximum packet delivery fraction and the minimum network and routing loads within fairly large networks with high-mobility nodes and large malicious node percentage. Thus, S-Octopus is a good choice for MANET established among students on a campus or peers at a conference, where keys and certificates might be previously deployed.
{"title":"S-Octopus: A Novel Scalable Secure Position-Based Routing Protocol for MANETs","authors":"L. Qabajeh","doi":"10.12720/jcm.18.7.398-423","DOIUrl":"https://doi.org/10.12720/jcm.18.7.398-423","url":null,"abstract":"Mobile Ad-Hoc Networks (MANET) are self-organized wireless networks that are becoming progressively popular. Determining an efficient route leading from a source to a specific destination in these networks is an essential issue since nodes are continuously moving. Furthermore, finding a secure route is a difficult area to deal with since adversaries might insert themselves into these routes unless a strict secure routing procedure is implemented. In this paper, a novel scalable secure routing protocol called S-Octopus has been proposed. Via dividing the network area into sectors and utilizing restricted directional flooding, our protocol intents to achieve improved scalability. Moreover, S-Octopus seeks to enhance robustness against the single point of failure and compromise by introducing several Sector Certificate Authority servers. Together with S-Octopus a location service and a misbehavior detection system have been proposed. Using GloMoSim simulator, S-Octopus security and performance have been evaluated and compared with the basic Authenticated Routing for Ad-Hoc Networks (ARAN) as well as Zone-based Authenticated Routing for Ad-Hoc Networks (ARANz). Simulation results assure that S-Octopus is able to effectively initiate and maintain secure routes in MANETs. Results also confirm that S-Octopus has significantly mitigated the scalability problem by achieving the maximum packet delivery fraction and the minimum network and routing loads within fairly large networks with high-mobility nodes and large malicious node percentage. Thus, S-Octopus is a good choice for MANET established among students on a campus or peers at a conference, where keys and certificates might be previously deployed.","PeriodicalId":14832,"journal":{"name":"J. Comput. Mediat. Commun.","volume":"456 1","pages":"398-423"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77521321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}