首页 > 最新文献

Int. J. Commun. Networks Inf. Secur.最新文献

英文 中文
A Model of a Distributed Information System based on the Z39.50 Protocol 基于Z39.50协议的分布式信息系统模型
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5122
S. Serikbayeva, J. Tussupov, M. Sambetbayeva, A. Yerimbetova, G.B. Borankulova, A. Tungatarova
Based on the analysis of typical scenarios of information servers, the tasks that should be solved when organizing an access control system for distributed information resources are formulated. The possibilities of the Z39.50 technologies as the most suitable for building such a system are considered. Within the framework of this technology, three access control models are discussed, which differ in the degree of integration of information server functions with the Z39.50 technologies.The creation and support of distributed information systems and electronic libraries that integrate heterogeneous information resources and operate in various software and hardware environments requires special approaches to managing these systems. If the resources or data themselves can be managed locally, even for distributed information systems, then the task of managing access to distributed resources cannot be solved within the framework of local administration. The justification of the last thesis can be seen when considering typical scenarios of the information server, which we will describe below
在分析信息服务器典型场景的基础上,提出了分布式信息资源访问控制系统组织需要解决的任务。考虑了Z39.50技术作为最适合构建这样一个系统的可能性。在该技术的框架内,讨论了三种访问控制模型,它们与Z39.50技术的集成程度不同。分布式信息系统和电子图书馆集成了异构信息资源,并在各种软件和硬件环境中运行,要创建和支持这些系统,需要特殊的方法来管理这些系统。如果资源或数据本身可以在本地管理,即使对于分布式信息系统也是如此,那么管理对分布式资源的访问的任务就不能在本地管理的框架内解决。在考虑信息服务器的典型场景时,可以看到最后一个论点的理由,我们将在下面描述
{"title":"A Model of a Distributed Information System based on the Z39.50 Protocol","authors":"S. Serikbayeva, J. Tussupov, M. Sambetbayeva, A. Yerimbetova, G.B. Borankulova, A. Tungatarova","doi":"10.54039/ijcnis.v13i3.5122","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5122","url":null,"abstract":"Based on the analysis of typical scenarios of information servers, the tasks that should be solved when organizing an access control system for distributed information resources are formulated. The possibilities of the Z39.50 technologies as the most suitable for building such a system are considered. Within the framework of this technology, three access control models are discussed, which differ in the degree of integration of information server functions with the Z39.50 technologies.The creation and support of distributed information systems and electronic libraries that integrate heterogeneous information resources and operate in various software and hardware environments requires special approaches to managing these systems. If the resources or data themselves can be managed locally, even for distributed information systems, then the task of managing access to distributed resources cannot be solved within the framework of local administration. The justification of the last thesis can be seen when considering typical scenarios of the information server, which we will describe below","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132596040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Authentication Scheme for Internet of Things 一种高效的物联网认证方案
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.3422
J. Al-Saraireh, Haya Joudeh
The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Things” have the ability to communicate, generate, transmit and store data over the network connection. During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks, loss, distortions and interruption which impair functionality, system efficiency and user satisfaction. Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner. Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol. The aim of this research is to enhance the authentication protocol, starting by reducing the heavy use of storage in “Things”, and eliminating unnecessary messages during authentication steps, taking into consideration the network security analysis. This research represents a security performance analysis and enhancement authentication for the IoT. The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.
物联网(IoT)正以多种深刻的方式日益影响着人类的生活。“物”具有通过网络连接进行通信、生成、传输和存储数据的能力。在“物”之间的每次通信中,传输的数据可能容易受到恶意攻击、丢失、扭曲和中断,从而损害功能、系统效率和用户满意度。此外,不适当的用户控制会导致物联网服务出现问题,例如允许匿名用户访问个人资源,允许合法用户以非法方式访问资源,或阻止合法用户以授权方式访问资源。因此,需要采用强认证协议对事物之间的通信进行认证、授权、保护,并保证其具有较高的私密性。本研究的目的是在考虑网络安全分析的情况下,从减少“物”中存储的大量使用,消除认证步骤中不必要的消息入手,对认证协议进行改进。本研究代表了物联网的安全性能分析和增强认证。结果表明,与其他两种用于比较目的的协议相比,增强协议在最小化数据包长度和时间性能方面具有积极作用,在验证曾经访问过访问位置区域的用户时,该协议的性能提高了33%。
{"title":"An Efficient Authentication Scheme for Internet of Things","authors":"J. Al-Saraireh, Haya Joudeh","doi":"10.54039/ijcnis.v13i3.3422","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.3422","url":null,"abstract":"The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Things” have the ability to communicate, generate, transmit and store data over the network connection. During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks, loss, distortions and interruption which impair functionality, system efficiency and user satisfaction. Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner. Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol. The aim of this research is to enhance the authentication protocol, starting by reducing the heavy use of storage in “Things”, and eliminating unnecessary messages during authentication steps, taking into consideration the network security analysis. This research represents a security performance analysis and enhancement authentication for the IoT. The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of image degradation on performance of Convolutional Neural Networks 图像退化对卷积神经网络性能的影响
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4946
Inad A. Aljarrah
The use of deep learning approaches in image classification and recognition tasks is growing rapidly and gaining huge importance in research due to the great enhancement they achieve. Particularly, Convolutional Neural Networks (CNN) have shown a great significance in the field of computer vision and image recognition recently. They made an enormous improvement in classification and recognition systems’ accuracy. In this work, an investigation of how image related parameters such as contrast, noise, and occlusion affect the work of CNNs is to be carried out. Also, whether all types of variations cause the same drop to performance and how they rank in that regard is considered. After the experiments were carried out, the results revealed that the extent of effect of each degradation type to be different from others. It was clear that blurring and occlusion affects accuracy more than noise when considering the root mean square error as a common objective measure of the amount of alteration that each degradation caused.
深度学习方法在图像分类和识别任务中的应用正在迅速增长,并且由于它们实现了巨大的增强而在研究中获得了巨大的重要性。特别是卷积神经网络(CNN)近年来在计算机视觉和图像识别领域表现出了重要的意义。他们极大地提高了分类和识别系统的准确性。在这项工作中,将调查图像相关参数(如对比度、噪声和遮挡)如何影响cnn的工作。此外,是否所有类型的变化都会导致相同的性能下降,以及它们在这方面的排名如何。实验结果表明,每种降解类型的影响程度不同。很明显,当考虑均方根误差作为每个退化引起的改变量的共同客观度量时,模糊和遮挡对准确性的影响比噪声更大。
{"title":"Effect of image degradation on performance of Convolutional Neural Networks","authors":"Inad A. Aljarrah","doi":"10.54039/IJCNIS.V13I2.4946","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4946","url":null,"abstract":"The use of deep learning approaches in image classification and recognition tasks is growing rapidly and gaining huge importance in research due to the great enhancement they achieve. Particularly, Convolutional Neural Networks (CNN) have shown a great significance in the field of computer vision and image recognition recently. They made an enormous improvement in classification and recognition systems’ accuracy. In this work, an investigation of how image related parameters such as contrast, noise, and occlusion affect the work of CNNs is to be carried out. Also, whether all types of variations cause the same drop to performance and how they rank in that regard is considered. After the experiments were carried out, the results revealed that the extent of effect of each degradation type to be different from others. It was clear that blurring and occlusion affects accuracy more than noise when considering the root mean square error as a common objective measure of the amount of alteration that each degradation caused.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"35 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Issues and Challenges for Network Virtualisation 网络虚拟化的问题与挑战
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4990
Nikheel Tashvin Seechurn, A. Mungur, Sheeba Armoogum, S. Pudaruth
In recent years, network virtualisation has been of great interest to researchers, being a relatively new and major paradigm in networking. This has been reflected in the IT industry where many virtualisation solutions are being marketed as revolutionary and purchased by enterprises to exploit these promised performances. Adversely, there are certain drawbacks like security, isolation and others that have conceded the network virtualisation. In this study, an investigation of the different state-of-the-art virtualisation technologies, their issues and challenges are addressed and besides, a guideline for a quintessential Network Virtualisation Environment (NVE) is been proposed. A systematic review was effectuated on selectively picked research papers and technical reports. Moreover a comparative study is performed on different Network Virtualisation technologies which include features like security, isolation, stability, convergence, outlay, scalability, robustness, manageability, resource management, programmability, flexibility, heterogeneity, legacy Support, and ease of deployment. The virtualisation technologies comprise Virtual Private Network (VPN), Virtual Local Area Network (VLAN), Virtual Extensible Local Area Network (VXLAN), Software Defined Networking (SDN) and Network Function Virtualisation (NFV). Conclusively the results exhibited the disparity as to the gaps of creating an ideal network virtualisation model which can be circumvented using these as a benchmark.
近年来,网络虚拟化作为一种相对较新的、主要的网络范式,引起了研究人员的极大兴趣。这在IT行业中得到了反映,许多虚拟化解决方案被标榜为革命性的,并被企业购买以利用这些承诺的性能。相反,有一些缺点,如安全性,隔离性和其他已经承认的网络虚拟化。在本研究中,对不同的最先进的虚拟化技术进行了调查,解决了它们的问题和挑战,此外,还提出了一个典型的网络虚拟化环境(NVE)的指导方针。对有选择地挑选的研究论文和技术报告进行了系统的审查。此外,还对不同的网络虚拟化技术进行了比较研究,这些技术包括安全性、隔离性、稳定性、收敛性、支出、可伸缩性、健壮性、可管理性、资源管理、可编程性、灵活性、异质性、遗留支持和易于部署等特性。虚拟化技术包括VPN (Virtual Private Network)、VLAN (Virtual Local Area Network)、VXLAN (Virtual Extensible Local Area Network)、SDN (Software Defined Networking)和NFV (Network Function virtualization)。最后,结果显示了创建理想网络虚拟化模型的差距,可以使用这些作为基准来规避。
{"title":"Issues and Challenges for Network Virtualisation","authors":"Nikheel Tashvin Seechurn, A. Mungur, Sheeba Armoogum, S. Pudaruth","doi":"10.54039/IJCNIS.V13I2.4990","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4990","url":null,"abstract":"In recent years, network virtualisation has been of great interest to researchers, being a relatively new and major paradigm in networking. This has been reflected in the IT industry where many virtualisation solutions are being marketed as revolutionary and purchased by enterprises to exploit these promised performances. Adversely, there are certain drawbacks like security, isolation and others that have conceded the network virtualisation. In this study, an investigation of the different state-of-the-art virtualisation technologies, their issues and challenges are addressed and besides, a guideline for a quintessential Network Virtualisation Environment (NVE) is been proposed. A systematic review was effectuated on selectively picked research papers and technical reports. Moreover a comparative study is performed on different Network Virtualisation technologies which include features like security, isolation, stability, convergence, outlay, scalability, robustness, manageability, resource management, programmability, flexibility, heterogeneity, legacy Support, and ease of deployment. The virtualisation technologies comprise Virtual Private Network (VPN), Virtual Local Area Network (VLAN), Virtual Extensible Local Area Network (VXLAN), Software Defined Networking (SDN) and Network Function Virtualisation (NFV). Conclusively the results exhibited the disparity as to the gaps of creating an ideal network virtualisation model which can be circumvented using these as a benchmark.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme 保护视频所有权防止数字盗版:一种有效的数字水印方案
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4945
Himanshu Agarwal, Farooq Husain
Violation of one’s intellectual ownership rights by the others is a common problem which entertainment industry frequently faces now-a-days. Sharing of information over social media platforms such as Instagram, WhatsApp and twitter without giving credit the owner causes huge financial losses to the owner and hence needs an immediate attention. Digital watermarking is a promising technique to protect owners’ right against digital piracy. Most of the state-of-the-art techniques does not provides adequate level of resilience against majority of video specific attacks and other commonly applied attacks. Therefore, this paper proposes a highly transparent and robust video watermarking solution to protect the owners rights by first convert each video frame into YCbCr color components and then select twenty five strongest speeded-up robust features (SURF) points of the normalized luminance component as points for both watermark embedding and extraction. After applying variety of geometric, simple signal processing and video specific attacks on the watermarked video meticulous analysis is performed using popular metrics which reveals that the proposed scheme possesses high correlation value which makes it superior for practical applications against these attacks. The scheme also proposes a novel three-level impairment scale for subjective analysis which gives stable results to derive correct conclusions.
知识产权被他人侵犯是当今娱乐行业经常面临的一个普遍问题。在Instagram、WhatsApp和twitter等社交媒体平台上分享信息而不给予所有者信用,会给所有者带来巨大的经济损失,因此需要立即引起注意。数字水印技术是一种很有前途的保护版权的技术。大多数最先进的技术都不能提供足够的弹性来抵御大多数视频特定攻击和其他常用攻击。为此,本文首先将每个视频帧转换为YCbCr颜色分量,然后选取归一化亮度分量中25个最强的加速鲁棒特征(SURF)点作为水印的嵌入和提取点,提出了一种高度透明和鲁棒性的视频水印方案,以保护所有者的权益。在对水印视频进行了各种几何、简单的信号处理和视频特定攻击后,使用流行的度量对该方案进行了细致的分析,结果表明,该方案具有较高的相关值,对这些攻击具有较好的实际应用价值。该方案还提出了一种新的主观分析的三级减值量表,结果稳定,可以得出正确的结论。
{"title":"Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme","authors":"Himanshu Agarwal, Farooq Husain","doi":"10.54039/IJCNIS.V13I2.4945","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4945","url":null,"abstract":"Violation of one’s intellectual ownership rights by the others is a common problem which entertainment industry frequently faces now-a-days. Sharing of information over social media platforms such as Instagram, WhatsApp and twitter without giving credit the owner causes huge financial losses to the owner and hence needs an immediate attention. Digital watermarking is a promising technique to protect owners’ right against digital piracy. Most of the state-of-the-art techniques does not provides adequate level of resilience against majority of video specific attacks and other commonly applied attacks. Therefore, this paper proposes a highly transparent and robust video watermarking solution to protect the owners rights by first convert each video frame into YCbCr color components and then select twenty five strongest speeded-up robust features (SURF) points of the normalized luminance component as points for both watermark embedding and extraction. After applying variety of geometric, simple signal processing and video specific attacks on the watermarked video meticulous analysis is performed using popular metrics which reveals that the proposed scheme possesses high correlation value which makes it superior for practical applications against these attacks. The scheme also proposes a novel three-level impairment scale for subjective analysis which gives stable results to derive correct conclusions.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-agent Framework for dynamic traffic management Considering Priority Link 考虑优先级链路的多智能体动态流量管理框架
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4977
Abdelouafi Ikidid, A. E. Fazziki, Mohamed Sadgal
To favor emergency vehicles, promote collective modes of transport in Moroccan cities, we propose in this paper a control system to manage traffic at signalized intersections with priority links in urban settings. This system combines multi-agent technology and fuzzy logic to regulate traffic flows. The traffic system flow is divided into two types of vehicles; priority and regular vehicles. The regular vehicles can use only the regular links, while the priority vehicles may use both priority and the regular links. This approach aims to favor emergency vehicles and promote collective modes of transport, it acts on the traffic light phases length and order to control all traffic flows. We proposed a decentralized system of regulation based on real-time monitoring to develop a local inter-section state, and intelligent coordination between neighboring intersections to build an overview of the traffic state. The regulation and prioritization decisions are made through cooperation, communication, and coordination between different agents. The performance of the proposed system is investigated and instantiated in ANYLOGIC simulator, using a section of the Marrakesh road network that contains priority links. The results indicate that the designed system can significantly develop the efficiency of the traffic regulation system.
为了支持应急车辆,促进摩洛哥城市的集体交通方式,我们在本文中提出了一种控制系统,用于管理城市设置中具有优先链接的信号交叉口的交通。该系统将多智能体技术与模糊逻辑相结合,对交通流进行调节。交通系统将车流分为两类车辆;优先和普通车辆。普通车辆只能使用普通链路,而优先车辆可以同时使用优先链路和普通链路。该方法的目的是支持应急车辆,促进集体运输方式,它通过红绿灯阶段长度和秩序来控制所有交通流量。我们提出了基于实时监控的分散监管系统,以发展局部交叉口状态,并在相邻交叉口之间进行智能协调,以构建交通状态概览。监管和优先级决策是通过不同主体之间的合作、沟通和协调做出的。所提出的系统的性能在ANYLOGIC模拟器中进行了调查和实例化,使用了马拉喀什的一段包含优先链路的道路网络。结果表明,所设计的系统能显著提高交通管理系统的效率。
{"title":"A multi-agent Framework for dynamic traffic management Considering Priority Link","authors":"Abdelouafi Ikidid, A. E. Fazziki, Mohamed Sadgal","doi":"10.54039/IJCNIS.V13I2.4977","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4977","url":null,"abstract":"To favor emergency vehicles, promote collective modes of transport in Moroccan cities, we propose in this paper a control system to manage traffic at signalized intersections with priority links in urban settings. This system combines multi-agent technology and fuzzy logic to regulate traffic flows. The traffic system flow is divided into two types of vehicles; priority and regular vehicles. The regular vehicles can use only the regular links, while the priority vehicles may use both priority and the regular links. This approach aims to favor emergency vehicles and promote collective modes of transport, it acts on the traffic light phases length and order to control all traffic flows. We proposed a decentralized system of regulation based on real-time monitoring to develop a local inter-section state, and intelligent coordination between neighboring intersections to build an overview of the traffic state. The regulation and prioritization decisions are made through cooperation, communication, and coordination between different agents. The performance of the proposed system is investigated and instantiated in ANYLOGIC simulator, using a section of the Marrakesh road network that contains priority links. The results indicate that the designed system can significantly develop the efficiency of the traffic regulation system.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area NB-IOT城域部署模式实验性能评估
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4969
K. Turzhanova, V. Tikhvinskiy, S. Konshin, A. Solochshenko
Narrow-band Internet of Things is a new promising radio technology standard that addresses the requirements of the IoT. The technology provides improved indoor coverage, support of massive number of low data rate devices, low delay sensitivity, ultra-low device cost, low device power consumption and optimized network architecture. The technology can be deployed in three different operational modes: (1) in-band, (2) guard-band, or (3) standalone in dedicated spectrum. The choice of NB-IoT deployment scenario has a significant impact on the quality and performance of the network.In this article, presented the results of an experimental study of the performance of all three scenarios for NB-IoT deploying in a real working cellular network under equal operating conditions for consideration. The following parameters chosen as an assessment measure: radio coverage, network capacity and user experience. The research shown that exact the standalone mode provide the best performance for these parameters. In addition, we have confirmed that all three NB-IoT scenarios coexist perfectly on 2G/4G networks and satisfy the original requirements of 3GPP's in deep coverage and robust quality of network service.
窄带物联网是一种新的有前途的无线电技术标准,满足了物联网的要求。该技术提供了更好的室内覆盖,支持大量低数据速率设备,低延迟灵敏度,超低设备成本,低设备功耗和优化的网络架构。该技术可以部署在三种不同的工作模式下:(1)带内,(2)保护带,或(3)独立于专用频谱。NB-IoT部署场景的选择对网络的质量和性能有着重要的影响。在本文中,介绍了在相同操作条件下,在实际工作的蜂窝网络中部署NB-IoT的所有三种场景的性能实验研究结果,以供考虑。选择以下参数作为评估指标:无线电覆盖范围、网络容量和用户体验。研究表明,精确的独立模式为这些参数提供了最佳的性能。此外,我们已经确认,这三种NB-IoT场景在2G/4G网络上完美共存,在深度覆盖和网络服务质量上满足3GPP的原始要求。
{"title":"Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area","authors":"K. Turzhanova, V. Tikhvinskiy, S. Konshin, A. Solochshenko","doi":"10.54039/IJCNIS.V13I2.4969","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4969","url":null,"abstract":"Narrow-band Internet of Things is a new promising radio technology standard that addresses the requirements of the IoT. The technology provides improved indoor coverage, support of massive number of low data rate devices, low delay sensitivity, ultra-low device cost, low device power consumption and optimized network architecture. The technology can be deployed in three different operational modes: (1) in-band, (2) guard-band, or (3) standalone in dedicated spectrum. The choice of NB-IoT deployment scenario has a significant impact on the quality and performance of the network.In this article, presented the results of an experimental study of the performance of all three scenarios for NB-IoT deploying in a real working cellular network under equal operating conditions for consideration. The following parameters chosen as an assessment measure: radio coverage, network capacity and user experience. The research shown that exact the standalone mode provide the best performance for these parameters. In addition, we have confirmed that all three NB-IoT scenarios coexist perfectly on 2G/4G networks and satisfy the original requirements of 3GPP's in deep coverage and robust quality of network service.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131896349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks 面向能量采集物联网网络的基于高斯函数形状的ii型模糊隶属度聚类协议
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4901
V. Bhatia, A. Girdhar, S. S. Khurmi
With the advancements in Internet of Things (IoT) technologies, energy harvesting IoT devices are becoming significantly important. These tiny IoT devices can harvest bounded energy, thus need an efficient protocol to conserve the energy in more efficient manner. From the review, it is found that the development of an efficient energy efficient protocol for energy harvesting IoT is still an open area of research. It is found that fuzzy based energy harvesting IoTs has shown significant improvement over the existing protocols. However, the fuzzy logic suffers from the data uncertainty issue. Therefore, in this paper, Gaussian functional shapes-based type-II fuzzy membership function is used to elect the cluster heads among the IoT devices to reduce the energy consumption of energy harvest IoTs. Thereafter, inter-cluster data aggregation is used. Finally, the communication between the elected cluster heads and the cloud servers or sink. Extensive experiments are drawn by considering the existing and the proposed protocols for energy harvesting IoTs. Comparative analysis reveals that the proposed type-II fuzzy membership function-based protocol outperforms the existing protocols in terms of bandwidth analysis, throughput, conserve energy, network lifetime, and average consumed energy.
随着物联网(IoT)技术的进步,能量收集物联网设备变得越来越重要。这些微小的物联网设备可以收集有限的能量,因此需要一个有效的协议以更有效的方式保存能量。从回顾中可以发现,为能量收集物联网开发高效节能协议仍然是一个开放的研究领域。研究发现,基于模糊的能量收集物联网比现有协议有了显著的改进。然而,模糊逻辑存在数据不确定性问题。因此,本文采用基于高斯函数形状的二类模糊隶属度函数来选择物联网设备间的簇首,以降低能量采集物联网的能耗。然后,使用集群间的数据聚合。最后,当选的集群头与云服务器或接收器之间的通信。通过考虑现有的和拟议的能量收集物联网协议,进行了广泛的实验。对比分析表明,本文提出的基于ⅱ类模糊隶属度函数的协议在带宽分析、吞吐量、节能、网络生存期和平均能耗等方面都优于现有协议。
{"title":"Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks","authors":"V. Bhatia, A. Girdhar, S. S. Khurmi","doi":"10.54039/IJCNIS.V13I2.4901","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4901","url":null,"abstract":"With the advancements in Internet of Things (IoT) technologies, energy harvesting IoT devices are becoming significantly important. These tiny IoT devices can harvest bounded energy, thus need an efficient protocol to conserve the energy in more efficient manner. From the review, it is found that the development of an efficient energy efficient protocol for energy harvesting IoT is still an open area of research. It is found that fuzzy based energy harvesting IoTs has shown significant improvement over the existing protocols. However, the fuzzy logic suffers from the data uncertainty issue. Therefore, in this paper, Gaussian functional shapes-based type-II fuzzy membership function is used to elect the cluster heads among the IoT devices to reduce the energy consumption of energy harvest IoTs. Thereafter, inter-cluster data aggregation is used. Finally, the communication between the elected cluster heads and the cloud servers or sink. Extensive experiments are drawn by considering the existing and the proposed protocols for energy harvesting IoTs. Comparative analysis reveals that the proposed type-II fuzzy membership function-based protocol outperforms the existing protocols in terms of bandwidth analysis, throughput, conserve energy, network lifetime, and average consumed energy.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types 不同类型数据包传输中控制信道带宽对电信网络质量影响的评估方法
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.5034
Mohialdeen Mustafa Mohammed, Zaika Viktor, Khlaponin Yurii, Berkman Lyubov, Polonskyi Konstiantyn, O. Turovsky
Abstract: It is known that since the early 2000s there has been a rapid increase in data traffic and a significant increase in the need for information flows in the process of providing new types of telecommunications services. This has led to the fact that the existing telecommunications networks have failed or approached the limit of their ability to serve subscribers with specified quality of service. The problem of improving the network architecture of such networks and improving the quality of their operation based on the use of modern methods and principles has arisen and needs constant solution. In this paper the requirements to the bandwidth of the channels of the telecommunication network management system in modern conditions are analyzed and their formalized description is given. In order to assess the bandwidth of the channel of the control network of the telecommunications network on the indicators of the quality of its work in the transmission of various types of data in the work developed and submitted an appropriate methodology. The method is based on mathematical dependences that describe the process of functioning of the telecommunication network management system based on the application of the laws and rules of queuing theory.
摘要:据了解,自21世纪初以来,在提供新型电信业务的过程中,数据流量迅速增加,对信息流的需求也显著增加。这导致现有的电信网络无法或接近其为用户提供特定服务质量的能力极限。利用现代化的方法和原理,改进网络结构,提高网络运行质量的问题已经出现,需要不断解决。本文分析了现代条件下电信网管系统对信道带宽的要求,并给出了形式化描述。为了评估电信网控制网信道的带宽对其在传输各类数据方面的工作质量的指标,在工作中制定并提出了一种适当的方法。该方法基于数学依赖关系来描述电信网络管理系统的运行过程,该数学依赖关系基于排队理论的规律和规则的应用。
{"title":"Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types","authors":"Mohialdeen Mustafa Mohammed, Zaika Viktor, Khlaponin Yurii, Berkman Lyubov, Polonskyi Konstiantyn, O. Turovsky","doi":"10.54039/IJCNIS.V13I2.5034","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.5034","url":null,"abstract":"Abstract: It is known that since the early 2000s there has been a rapid increase in data traffic and a significant increase in the need for information flows in the process of providing new types of telecommunications services. This has led to the fact that the existing telecommunications networks have failed or approached the limit of their ability to serve subscribers with specified quality of service. The problem of improving the network architecture of such networks and improving the quality of their operation based on the use of modern methods and principles has arisen and needs constant solution. In this paper the requirements to the bandwidth of the channels of the telecommunication network management system in modern conditions are analyzed and their formalized description is given. In order to assess the bandwidth of the channel of the control network of the telecommunications network on the indicators of the quality of its work in the transmission of various types of data in the work developed and submitted an appropriate methodology. The method is based on mathematical dependences that describe the process of functioning of the telecommunication network management system based on the application of the laws and rules of queuing theory.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121743891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Z-Transform Based Encryption Algorithm 基于z变换的加密算法研究
Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.5052
M. Alenezi, Fawaz S. Al-Anzi
It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.
确保信息,特别是传输中的数据的保护变得越来越重要。因此,保护信息不受安全攻击是任何加密算法的首要目标。设计具有可承受的实现成本的高性能解决方案同样重要。在日常交易中,为了保护隐私、防止数据欺诈、防止未经授权的数据访问,使用加密算法将明文转换为密文。有多种类型的加密算法,每种算法都有其增强安全性的利基策略。例如:Blowfish、RSA、AES、DES、Triple DES等算法。本文提出了一种基于Z变换和异或函数的高效安全的信息安全加密算法技术,称为Z变换加密(ZTE)技术。为了详细说明,该技术在源上实现了Z变换和异或操作的概念。在事务的接收端应用反向过程,其中应用Z变换的逆和异或来显示原始纯文本消息。采用R语言对所提出的算法进行了仿真。结果表明,与其他对称算法相比,该算法具有良好的性能。
{"title":"A Study of Z-Transform Based Encryption Algorithm","authors":"M. Alenezi, Fawaz S. Al-Anzi","doi":"10.54039/IJCNIS.V13I2.5052","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.5052","url":null,"abstract":"It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Commun. Networks Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1