首页 > 最新文献

Int. J. Commun. Networks Inf. Secur.最新文献

英文 中文
Underwater Acoustic Sensor Network Data Optimization with Enhanced Void Avoidance and Routing Protocol 基于增强空避和路由协议的水声传感器网络数据优化
Pub Date : 2022-12-31 DOI: 10.17762/ijcnis.v14i3.5602
M. Garg, Sachin Sharma, Vincent Balu, D. Sinha, P. Bhatt, Akash Kumar Bhagat
Deployment of a multi-hop underwater acoustic sensor network (UASN) in a larger region presents innovative challenges in reliable data communications and survivability of network because of the limited underwater interaction range or bandwidth and the limited energy of underwater sensor nodes. UASNs are becoming very significant in ocean exploration applications, like underwater device maintenance, ocean monitoring, ocean resource management, pollution detection, and so on. To overcome those difficulties and attains the purpose of maximizing data delivery ratio and minimizing energy consumption of underwater SNs, routing becomes necessary. In UASN, as the routing protocol will guarantee effective and reliable data communication from the source node to the destination, routing protocol model was an alluring topic for researchers. There were several routing techniques devised recently. This manuscript presents an underwater acoustic sensor network data optimization with enhanced void avoidance and routing (UASN-DAEVAR) protocol. The presented UASN-DAEVAR technique aims to present an effective data transmission process using proficient routing protocols. In the presented UASN-DAEVAR technique, a red deer algorithm (RDA) is employed in this study. In addition, the UASN-DAEVAR technique computes optimal routes in the UASN. To exhibit the effectual results of the UASN-DAEVAR technique, a wide spread experimental analysis is made. The experimental outcomes represented the enhancements of the UASN-DAEVAR model.
由于水下交互范围或带宽有限,水下传感器节点能量有限,在更大范围内部署多跳水声传感器网络(usasn)对网络的可靠数据通信和生存能力提出了创新挑战。在水下设备维护、海洋监测、海洋资源管理、污染检测等海洋勘探应用中,无人潜艇的作用越来越重要。为了克服这些困难,达到最大化水下SNs数据传输率和最小化能耗的目的,路由就成为必要。在usasn中,路由协议将保证从源节点到目的节点的有效、可靠的数据通信,因此路由协议模型是一个具有吸引力的研究课题。最近设计了几种路由技术。本文提出了一种具有增强空避和路由(usn - daevar)协议的水声传感器网络数据优化。提出的usn - daevar技术旨在使用熟练的路由协议提供有效的数据传输过程。在提出的usn - daevar技术中,本研究采用了马鹿算法(RDA)。此外,usasn - daevar技术在usasn中计算最优路由。为了展示usn - daevar技术的有效效果,进行了广泛的实验分析。实验结果反映了usn - daevar模型的增强。
{"title":"Underwater Acoustic Sensor Network Data Optimization with Enhanced Void Avoidance and Routing Protocol","authors":"M. Garg, Sachin Sharma, Vincent Balu, D. Sinha, P. Bhatt, Akash Kumar Bhagat","doi":"10.17762/ijcnis.v14i3.5602","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5602","url":null,"abstract":"Deployment of a multi-hop underwater acoustic sensor network (UASN) in a larger region presents innovative challenges in reliable data communications and survivability of network because of the limited underwater interaction range or bandwidth and the limited energy of underwater sensor nodes. UASNs are becoming very significant in ocean exploration applications, like underwater device maintenance, ocean monitoring, ocean resource management, pollution detection, and so on. To overcome those difficulties and attains the purpose of maximizing data delivery ratio and minimizing energy consumption of underwater SNs, routing becomes necessary. In UASN, as the routing protocol will guarantee effective and reliable data communication from the source node to the destination, routing protocol model was an alluring topic for researchers. There were several routing techniques devised recently. This manuscript presents an underwater acoustic sensor network data optimization with enhanced void avoidance and routing (UASN-DAEVAR) protocol. The presented UASN-DAEVAR technique aims to present an effective data transmission process using proficient routing protocols. In the presented UASN-DAEVAR technique, a red deer algorithm (RDA) is employed in this study. In addition, the UASN-DAEVAR technique computes optimal routes in the UASN. To exhibit the effectual results of the UASN-DAEVAR technique, a wide spread experimental analysis is made. The experimental outcomes represented the enhancements of the UASN-DAEVAR model.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131147686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generative Boltzmann Adversarial Network in Manet Attack Detection and QOS Enhancement with Latency 基于生成玻尔兹曼对抗网络的Manet攻击检测与时延QOS增强
Pub Date : 2022-12-31 DOI: 10.17762/ijcnis.v14i3.5606
Dr. Arun Kumar Marandi, Richa Dogra, R. Bhatt, Rajesh K. Gupta, Somashekar Reddy, Amit Barve
Mobile Ad-Hoc Network (MANET) are considered as self-configured network those does not have any centralized base station for the network monitoring and control. MANET environment does not control architecture for routing for the frequent maintenance of topology. The drastic development of Internet leads to adverse effect of development in MANET for different multimedia application those are sensitive to latency. Upon the effective maintenance of the QoS routing route discovery is performed to calculate queue and contention delay. However, the MANET requirement comprises of the complex procedure to withstand the Quality of Service (QoS) with Artificial Intelligence (AI). In MANET it is necessary to compute the MANET attacks with improved QoS with the reduced latency as existing model leads to higher routing and increased latency.  In this paper proposed a Generative Boltzmann Networking Weighted Graph (GBNWG) model for the QoS improvement in MANET to reduce latency. With GBNWG model the MANET model network performance are computed with the weighted graph model. The developed weighted graph computes the routes in the MANET network for the estimation of the available path in the routing metrices. The proposed GBNWG model is comparatively estimated with the conventional QOD technique. Simulation analysis stated that GBNWG scheme exhibits the improved performance in the QoS parameters. The GBNWG scheme improves the PDR value by 12%, 41% reduced control packets and 45% improved throughput value.
移动自组织网络(MANET)被认为是一种自配置网络,它没有任何集中的基站来进行网络监控。由于拓扑结构的频繁维护,MANET环境不控制路由体系结构。随着互联网的迅猛发展,对时延敏感的多媒体应用对无线局域网的发展产生了不利的影响。在有效维护QoS路由的基础上,进行路由发现,计算队列和争用延迟。然而,MANET需求包括复杂的过程,以承受人工智能(AI)的服务质量(QoS)。在MANET中,由于现有模型导致更高的路由和增加的延迟,有必要计算具有改进QoS和减少延迟的MANET攻击。本文提出了一种生成式玻尔兹曼网络加权图(GBNWG)模型,用于改善MANET的QoS,以减少延迟。采用GBNWG模型,用加权图模型计算了MANET模型的网络性能。提出的加权图计算了自组网中的路由,以估计路由度量中的可用路径。将所提出的GBNWG模型与传统的QOD技术进行了比较估计。仿真分析表明,GBNWG方案在QoS参数方面表现出较好的性能。GBNWG方案提高了12%的PDR值,减少了41%的控制数据包,提高了45%的吞吐量值。
{"title":"Generative Boltzmann Adversarial Network in Manet Attack Detection and QOS Enhancement with Latency","authors":"Dr. Arun Kumar Marandi, Richa Dogra, R. Bhatt, Rajesh K. Gupta, Somashekar Reddy, Amit Barve","doi":"10.17762/ijcnis.v14i3.5606","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5606","url":null,"abstract":"Mobile Ad-Hoc Network (MANET) are considered as self-configured network those does not have any centralized base station for the network monitoring and control. MANET environment does not control architecture for routing for the frequent maintenance of topology. The drastic development of Internet leads to adverse effect of development in MANET for different multimedia application those are sensitive to latency. Upon the effective maintenance of the QoS routing route discovery is performed to calculate queue and contention delay. However, the MANET requirement comprises of the complex procedure to withstand the Quality of Service (QoS) with Artificial Intelligence (AI). In MANET it is necessary to compute the MANET attacks with improved QoS with the reduced latency as existing model leads to higher routing and increased latency.  In this paper proposed a Generative Boltzmann Networking Weighted Graph (GBNWG) model for the QoS improvement in MANET to reduce latency. With GBNWG model the MANET model network performance are computed with the weighted graph model. The developed weighted graph computes the routes in the MANET network for the estimation of the available path in the routing metrices. The proposed GBNWG model is comparatively estimated with the conventional QOD technique. Simulation analysis stated that GBNWG scheme exhibits the improved performance in the QoS parameters. The GBNWG scheme improves the PDR value by 12%, 41% reduced control packets and 45% improved throughput value.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126547499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks 基于AI技术和物联网4G网络的数据监控系统在网络安全攻击防范中的蜜网实现
Pub Date : 2022-12-31 DOI: 10.17762/ijcnis.v14i3.5603
Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Sivasankar, V. Vekariya, A. Kumari
Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.
网络物理系统(Cyber Physical Systems, CPS)是由泛在对象(ubiquitous object)概念组成的,它通过网络提供数据传输和感知能力。随着物联网(IoT)的实施,智能家电通过CPS设备传输数据,具有节省时间、降低成本、提高人体舒适度和高效用电等显著优势。在最小复杂度的传感器节点中,采用网络物理系统进行客户端或主机之间的无线网络连接。而传统的安全方案采用的是桌面设备在最小的存储空间环境、最小的功耗处理和有限的能量备份下高效利用资源的机制。本文提出了一种安全蜜网密钥认证(Secure Honeynet key authentication, SHKA)模型,通过物联网4G通信进行有效的数据监控,防范安全攻击。提出的SHKA模型使用轻量级密钥协议方案进行身份验证,以解决CPS应用程序中的安全威胁和机密性问题。通过SHKA蜜网模型的实现,对物联网环境中的数据进行监控,形成物联网环境中的安全机制。SHKA方案中的中间件模块采用Raspberry平台建立CPS设备间的互联,实现了动态和可扩展性。安全的物联网基础设施包括以用户为中心的灵活评估环境的有效性评估。所开发的SHKA模型在CPS设备之间进行相互认证,以实现最小的计算开销和效率。无线信道采用动态会话密钥进行安全通信,保证了CPS系统的网络攻击安全,具有轻量级的安全性。基于低功耗处理、减少存储和最小备用能量三个约束条件的SHKA模型证明了其有效性。实验分析表明,所提出的SHKA方案在每个会话中提供轻量级的端到端密钥建立。CPS设备生成128位长的会话密钥。实现最小密钥大小,以最小的执行时间为物联网4G通信提供有效的安全性。仿真结果表明,SHKA模型对约束设备进行了有效的网络攻击,提高了物联网网络的性能。
{"title":"Honeynet Implementation in Cyber Security Attack Prevention with Data Monitoring System Using AI Technique and IoT 4G Networks","authors":"Kushnian Kour, Subhashish Goswami, Meenakshi Sharma, P. Sivasankar, V. Vekariya, A. Kumari","doi":"10.17762/ijcnis.v14i3.5603","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5603","url":null,"abstract":"Cyber Physical Systems (CPS) comprises of the ubiquitous object concept those are connected with Internet to provide ability of data transmission and sensing over network. The smart appliances transmits the data through CPS devices with the implementation of Internet of Things (IoT) exhibits improved performance characteristics with significant advantages such as time savings, reduced cost, higher human comfort and efficient electricity utilization. In the minimal complexity sensor nodes cyber physical system is adopted for the heterogeneous environment for the wireless network connection between clients or hosts. However, the conventional security scheme uses the mechanisms for desktop devices with efficient utilization of resources in the minimal storage space environment, minimal power processing and limited energy backup. This paper proposed a Secure Honeynet key authentication (SHKA) model for security attack prevention through effective data monitoring with IoT 4G communication. The proposed SHKA model uses the lightweight key agreement scheme for authentication to provide security threats and confidentiality issues in CPS applications. With the implementation of SHKA HoneyNet model the data in IoT are monitored for security mechanism in IoT environment. The middleware module in SHKA scheme uses the Raspberry platform to establish internetworking between CPS device to achieve dynamic and scalability. The secure IoT infrastructure comprises of flexible evaluation of user-centric environment evaluation for the effectiveness. The developed SHKA model perform mutual authentication between CPS devices for minimal computation overhead and efficiency. The wireless channel uses the dynamic session key for the secure communication for cyber-attacks security with lightweight security in CPS system. The SHKA model demonstrate the effectiveness based on consideration of three constraints such as low power processing, reduced storage and minimal backup energy. Experimental analysis stated that proposed SHKA scheme provides lightweight end-to-end key establishment in every session. The CPS devices generates the session key of 128 bit long. The minimum key size is implemented to provide effective security in IoT 4G communication with minimal execution time. The simulation results demonstrated that SHKA model exhibits effective cyber-attacks for the constraint devices to improve performance of IoT network.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques 区块链技术在医疗保健系统中的实时应用,使用物联网和深度学习技术
Pub Date : 2022-12-31 DOI: 10.17762/ijcnis.v14i3.5621
Alcides Bernardo Tello, Jiuhong Xing, A. L. Patil, Lalitkumar Premchandra Patil, Shabnam Sayyad
Data transparency, flexible access, immutability, privacy, audit, traceability, data provenance, trust, and security are fundamental issues for modern healthcare data management systems. As a promising new technology, blockchain has the potential to enhance healthcare data management functions by boosting data efficiency and guaranteeing trust. The present research looked into the benefits of blockchain technology in healthcare and the challenges that have prevented its widespread implementation so far. Healthcare organisations around the world are using a variety of methods to modernise into more effective, coordinated and user-cantered structures. There is an increase in both human effort and security risks when dealing with massive amounts of data, such as reports and images for each individual. Internet of Things (IoT) solutions in healthcare aim to address these problems by enhancing patient care while reducing costs through more effective use of healthcare resources. However, many different types of intrusion can pose serious risks to IoT devices. In some cases, doctors will insist that their patients use only certain labs or pharmacies, regardless of the quality of the services they provide, simply to increase the doctor's bottom line. Because of this, protecting data is essential when discussing the Internet of Things. To solve these problems, Blockchain technology has emerged as the most reliable method for protecting the privacy of control systems in real time. In this paper, we will introduce a CNN-based healthcare data security framework using the blockchain technique by generating the hash of each data point, which will alert all users of the blockchain network to any unauthorised changes to data or breaches in the supply of medicines.
数据透明、灵活访问、不变性、隐私、审计、可追溯性、数据来源、信任和安全性是现代医疗保健数据管理系统的基本问题。区块链作为一项有前景的新技术,有潜力通过提高数据效率和保证信任来增强医疗数据管理功能。目前的研究调查了区块链技术在医疗保健领域的好处,以及迄今为止阻碍其广泛实施的挑战。世界各地的医疗机构都在使用各种各样的方法来实现现代化,使其成为更有效、更协调、更以用户为中心的结构。在处理大量数据(例如每个人的报告和图像)时,人力和安全风险都会增加。医疗保健领域的物联网(IoT)解决方案旨在通过更有效地利用医疗保健资源来改善患者护理,同时降低成本,从而解决这些问题。然而,许多不同类型的入侵可能对物联网设备构成严重风险。在某些情况下,医生会坚持让他们的病人只使用某些实验室或药店,而不管他们提供的服务质量如何,只是为了增加医生的底线。正因为如此,在讨论物联网时保护数据至关重要。为了解决这些问题,区块链技术已经成为实时保护控制系统隐私的最可靠方法。在本文中,我们将使用区块链技术通过生成每个数据点的哈希来引入基于cnn的医疗保健数据安全框架,这将提醒区块链网络的所有用户注意任何未经授权的数据更改或药品供应中的违规行为。
{"title":"Blockchain Technologies in Healthcare System for Real Time Applications Using IoT and Deep Learning Techniques","authors":"Alcides Bernardo Tello, Jiuhong Xing, A. L. Patil, Lalitkumar Premchandra Patil, Shabnam Sayyad","doi":"10.17762/ijcnis.v14i3.5621","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5621","url":null,"abstract":"Data transparency, flexible access, immutability, privacy, audit, traceability, data provenance, trust, and security are fundamental issues for modern healthcare data management systems. As a promising new technology, blockchain has the potential to enhance healthcare data management functions by boosting data efficiency and guaranteeing trust. The present research looked into the benefits of blockchain technology in healthcare and the challenges that have prevented its widespread implementation so far. Healthcare organisations around the world are using a variety of methods to modernise into more effective, coordinated and user-cantered structures. There is an increase in both human effort and security risks when dealing with massive amounts of data, such as reports and images for each individual. Internet of Things (IoT) solutions in healthcare aim to address these problems by enhancing patient care while reducing costs through more effective use of healthcare resources. However, many different types of intrusion can pose serious risks to IoT devices. In some cases, doctors will insist that their patients use only certain labs or pharmacies, regardless of the quality of the services they provide, simply to increase the doctor's bottom line. Because of this, protecting data is essential when discussing the Internet of Things. To solve these problems, Blockchain technology has emerged as the most reliable method for protecting the privacy of control systems in real time. In this paper, we will introduce a CNN-based healthcare data security framework using the blockchain technique by generating the hash of each data point, which will alert all users of the blockchain network to any unauthorised changes to data or breaches in the supply of medicines.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115302363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of MEMS Based Oscillator for High Frequency Wireless Communication Systems 高频无线通信系统中基于MEMS振荡器的性能分析
Pub Date : 2022-12-23 DOI: 10.17762/ijcnis.v14i3.5574
Dhifaf Talal Shakir, Hassan Jassim Al-Qureshy, Saad S. Hreshee
The frequency oscillator is a basic component found in many electrical, electronic, and communications circuits and systems. Oscillators come in a variety of shapes and sizes, depending on the frequency range employed in a given application. Some applications need oscillators that generate low frequencies and other applications need oscillators that generate extremely high and high frequencies. As a result of the expansion and speed of modern technologies, new oscillators appeared that operating at extremely high frequencies. Most wireless communication systems are constrained in their performance by the accuracy and stability of the reference frequency. Because of its compatibility with silicon, micro-electro-mechanical system (MEMS) is the preferred technology for circuit integration and power reduction. MEMS are a rapidly evolving area of advanced microelectronics. The integration of electrical and mechanical components at the micro size is referred to as a MEMS. MEMS based oscillators have demonstrated tremendous high frequency application potential in recent years. This is owing to their great characteristics such as small size, integration of CMOS IC technology, high frequency-quality factor product, low power consumption, and cheap batch manufacturing cost. This paper's primary objective is to describe the performance of MEMS oscillator technology in high-frequency applications, as well as to discuss the challenges of developing a new MEMS oscillator capable of operating at gigahertz frequencies.
频率振荡器是在许多电气、电子和通信电路和系统中发现的基本组件。振荡器有各种形状和尺寸,这取决于在给定应用中使用的频率范围。一些应用需要产生低频的振荡器,而其他应用需要产生极高和极高频率的振荡器。由于现代技术的发展和速度,出现了以极高频率工作的新型振荡器。大多数无线通信系统的性能受到参考频率的精度和稳定性的限制。微机电系统(MEMS)由于其与硅的兼容性,是电路集成和降低功耗的首选技术。微机电系统是一个快速发展的先进微电子领域。电子和机械元件在微尺寸上的集成被称为MEMS。近年来,基于MEMS的振荡器显示出巨大的高频应用潜力。这是因为它们具有体积小、集成了CMOS集成电路技术、产品质量因数高、功耗低、批量生产成本低等特点。本文的主要目的是描述MEMS振荡器技术在高频应用中的性能,以及讨论开发能够在千兆赫频率下工作的新型MEMS振荡器的挑战。
{"title":"Performance Analysis of MEMS Based Oscillator for High Frequency Wireless Communication Systems","authors":"Dhifaf Talal Shakir, Hassan Jassim Al-Qureshy, Saad S. Hreshee","doi":"10.17762/ijcnis.v14i3.5574","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5574","url":null,"abstract":"The frequency oscillator is a basic component found in many electrical, electronic, and communications circuits and systems. Oscillators come in a variety of shapes and sizes, depending on the frequency range employed in a given application. Some applications need oscillators that generate low frequencies and other applications need oscillators that generate extremely high and high frequencies. As a result of the expansion and speed of modern technologies, new oscillators appeared that operating at extremely high frequencies. Most wireless communication systems are constrained in their performance by the accuracy and stability of the reference frequency. Because of its compatibility with silicon, micro-electro-mechanical system (MEMS) is the preferred technology for circuit integration and power reduction. MEMS are a rapidly evolving area of advanced microelectronics. The integration of electrical and mechanical components at the micro size is referred to as a MEMS. MEMS based oscillators have demonstrated tremendous high frequency application potential in recent years. This is owing to their great characteristics such as small size, integration of CMOS IC technology, high frequency-quality factor product, low power consumption, and cheap batch manufacturing cost. This paper's primary objective is to describe the performance of MEMS oscillator technology in high-frequency applications, as well as to discuss the challenges of developing a new MEMS oscillator capable of operating at gigahertz frequencies.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115238234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cloud Computing Based Computing System for Women's Higher Education in Isolated Areas 基于云计算的偏远地区女性高等教育计算系统
Pub Date : 2022-12-23 DOI: 10.17762/ijcnis.v14i3.5568
Ranjani M, Unggul Priyadi, Anas A. Salameh, Mochamad Ali Imron, K. Kishore
A new chapter in information technology is opened by cloud computing in computer science and engineering education. Understanding the importance of using cloud computing (CC) in institutions of higher learning is the aim of this research. This analysis shows some of the benefits that cloud computing can provide to higher education, assesses some of the most significant challenges that academics may encounter as a result of its implementation, and suggests some initial steps toward its adoption while mitigating the risks associated. Enterprise apps have migrated in large numbers to the cloud in recent years. One of the challenges posed by cloud applications is the challenge of allocating resources to the application to ensure a service level along dimensions like performance, availability, and dependability. To do this, a system based on the infrastructure of governmental bodies, non-governmental organisations (NGOs), academic institutions, and other providers of social services has been established. The results of this analysis demonstrate that it is possible to use a few variables, including administrative bodies and governments, internal stakeholders, cloud suppliers, firm attributes, socio-political changes, IT framework, and others, to understand how CC adoption methodologies are used in higher education institutions. In addition to providing insight into how cloud providers, advisers, governments, and academics see various market demands and how they respond to these expectations while expanding services provided by CC in higher education institutions, this analysis opens opportunities for future research. The implications for practice can aid decision-makers in utilizing CC services legally.
云计算在计算机科学和工程教育中开启了信息技术的新篇章。了解在高等院校使用云计算(CC)的重要性是本研究的目的。本分析显示了云计算可以为高等教育提供的一些好处,评估了由于云计算的实施,学术界可能会遇到的一些最重大的挑战,并建议了一些初步的步骤,同时降低了相关的风险。近年来,企业应用程序已经大量迁移到云端。云应用程序带来的挑战之一是向应用程序分配资源,以确保性能、可用性和可靠性等方面的服务水平。为此,建立了一个以政府机构、非政府组织、学术机构和其他社会服务提供者的基础设施为基础的系统。该分析的结果表明,可以使用一些变量,包括行政机构和政府、内部利益相关者、云供应商、公司属性、社会政治变化、it框架等,来了解CC采用方法如何在高等教育机构中使用。除了深入了解云提供商、顾问、政府和学者如何看待各种市场需求,以及他们在扩大CC在高等教育机构提供的服务时如何回应这些期望之外,本分析还为未来的研究开辟了机会。对实践的影响可以帮助决策者合法地利用CC服务。
{"title":"Cloud Computing Based Computing System for Women's Higher Education in Isolated Areas","authors":"Ranjani M, Unggul Priyadi, Anas A. Salameh, Mochamad Ali Imron, K. Kishore","doi":"10.17762/ijcnis.v14i3.5568","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5568","url":null,"abstract":"A new chapter in information technology is opened by cloud computing in computer science and engineering education. Understanding the importance of using cloud computing (CC) in institutions of higher learning is the aim of this research. This analysis shows some of the benefits that cloud computing can provide to higher education, assesses some of the most significant challenges that academics may encounter as a result of its implementation, and suggests some initial steps toward its adoption while mitigating the risks associated. Enterprise apps have migrated in large numbers to the cloud in recent years. One of the challenges posed by cloud applications is the challenge of allocating resources to the application to ensure a service level along dimensions like performance, availability, and dependability. To do this, a system based on the infrastructure of governmental bodies, non-governmental organisations (NGOs), academic institutions, and other providers of social services has been established. The results of this analysis demonstrate that it is possible to use a few variables, including administrative bodies and governments, internal stakeholders, cloud suppliers, firm attributes, socio-political changes, IT framework, and others, to understand how CC adoption methodologies are used in higher education institutions. In addition to providing insight into how cloud providers, advisers, governments, and academics see various market demands and how they respond to these expectations while expanding services provided by CC in higher education institutions, this analysis opens opportunities for future research. The implications for practice can aid decision-makers in utilizing CC services legally.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133166456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Supervised Machine Learning Based Intrusion Detection Model for Detecting Cyber-Attacks Against Computer System 基于监督机器学习的计算机系统入侵检测模型
Pub Date : 2022-12-23 DOI: 10.17762/ijcnis.v14i3.5567
Santhosh Kumar Chenniappanadar, Gnanamurthy Sundharamurthy, Vinoth Kumar Sakthivelu, V. K. Kaliappan
Internet usage has become essential for correspondence in almost every calling in our digital age. To protect a network, an effective intrusion detection system (IDS) is vital. Intrusion Detection System is a software application to detect network intrusion using various machine learning algorithms. The function of the expert has been lessened by machine learning approaches since knowledge is taken directly from the data. The fact that it makes use of all the features of an information packet spinning in the network for intrusion detection is weakened by the employment of various methods for detecting intrusions, such as statistical models, safe system approaches, etc. Machine learning has become a fundamental innovation for cyber security. Two of the key types of attacks that plague businesses, as proposed in this paper, are Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks. One of the most disastrous attacks on the Internet of Things (IOT) is a denial of service.  Two diverse Machine Learning techniques are proposed in this research work, mainly Supervised learning. To achieve this goal, the paper represents a regression algorithm, which is usually used in data science and machine learning to forecast the future. An innovative approach to detecting is by using the Machine Learning algorithm by mining application-specific logs. Cyber security is a way of providing their customers the peace of mind they need knowing that they have secured their information and money.
在我们这个数字时代,互联网的使用已经成为几乎所有行业通信的必要条件。为了保护网络,一个有效的入侵检测系统(IDS)是至关重要的。入侵检测系统是一种使用各种机器学习算法检测网络入侵的软件应用程序。由于知识是直接从数据中获取的,因此机器学习方法减少了专家的功能。它利用网络中信息包旋转的所有特征进行入侵检测,这一事实被各种检测入侵的方法(如统计模型、安全系统方法等)所削弱。机器学习已经成为网络安全的一项根本性创新。本文提出了困扰企业的两种主要攻击类型,即拒绝服务(DOS)和分布式拒绝服务(DDOS)攻击。对物联网(IOT)最具灾难性的攻击之一是拒绝服务攻击。本研究提出了两种不同的机器学习技术,主要是监督学习。为了实现这一目标,本文代表了一种回归算法,该算法通常用于数据科学和机器学习中预测未来。一种创新的检测方法是通过挖掘特定应用程序的日志来使用机器学习算法。网络安全是一种让他们的客户安心的方式,他们需要知道他们已经保护了他们的信息和金钱。
{"title":"A Supervised Machine Learning Based Intrusion Detection Model for Detecting Cyber-Attacks Against Computer System","authors":"Santhosh Kumar Chenniappanadar, Gnanamurthy Sundharamurthy, Vinoth Kumar Sakthivelu, V. K. Kaliappan","doi":"10.17762/ijcnis.v14i3.5567","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5567","url":null,"abstract":"Internet usage has become essential for correspondence in almost every calling in our digital age. To protect a network, an effective intrusion detection system (IDS) is vital. Intrusion Detection System is a software application to detect network intrusion using various machine learning algorithms. The function of the expert has been lessened by machine learning approaches since knowledge is taken directly from the data. The fact that it makes use of all the features of an information packet spinning in the network for intrusion detection is weakened by the employment of various methods for detecting intrusions, such as statistical models, safe system approaches, etc. Machine learning has become a fundamental innovation for cyber security. Two of the key types of attacks that plague businesses, as proposed in this paper, are Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks. One of the most disastrous attacks on the Internet of Things (IOT) is a denial of service.  Two diverse Machine Learning techniques are proposed in this research work, mainly Supervised learning. To achieve this goal, the paper represents a regression algorithm, which is usually used in data science and machine learning to forecast the future. An innovative approach to detecting is by using the Machine Learning algorithm by mining application-specific logs. Cyber security is a way of providing their customers the peace of mind they need knowing that they have secured their information and money.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Security Enhancement in 4G Vehicular Networks Based on Reinforcement Learning for Satellite Edge Computing 基于卫星边缘计算强化学习的4G车联网数据安全增强
Pub Date : 2022-12-23 DOI: 10.17762/ijcnis.v14i3.5571
Luis Alberto Núñez Lira, K. A. Kumari, R. Raman, Ardhariksa Zukhruf Kurniullah, Santiago Aquiles Gallarday Morales, Tula Del Carmen Espinoza Cordero
The vehicular network provides the dedicated short-range communication (DSRC) with IEEE 802.11p standard. The VANET model comprises of cellular vehicle-to-everything communication with wireless communication technology. Vehicular Edge Computing exhibits the promising technology to provide promising Intelligent Transport System Services. Smart application and urban computing. Satellite edge computing model is adopted in vehicular networks to provide services to the VANET communication for the management of computational resources for the end-users to provide access to low latency services for maximal execution of service. The satellite edge computing model implemented with the 4G vehicular communication network model subjected to data security issues. This paper presented a Route Computation Deep Learning Model (RCDL) to improve security in VANET communication with 4G technology. The RCDL model uses the route establishment model with the optimal route selection. The compute route is transmitted with the cryptographic scheme model for the selection of optimal route identified from the satellite edge computing model. The proposed RCDL scheme uses the deep learning-based reinforcement learning scheme for the attack prevention in the VANET environment employed with the 4G technology communication model. The simulation results expressed that proposed RCDL model achieves the higher PDR value of 98% which is ~6% higher than the existing model. The estimation of end-to-end delay is minimal for the RCDL scheme and improves the VANET communication.
车载网络提供IEEE 802.11p标准的专用短距离通信(DSRC)。VANET模型包括蜂窝车对万物通信与无线通信技术。车辆边缘计算展示了提供有前途的智能交通系统服务的有前途的技术。智能应用和城市计算。车载网络采用卫星边缘计算模型,为VANET通信提供服务,为终端用户管理计算资源,为终端用户提供低延迟服务的接入,最大限度地执行服务。采用4G车载通信网络模型实现的卫星边缘计算模型存在数据安全问题。本文提出了一种路由计算深度学习模型(RCDL),以提高4G技术下VANET通信的安全性。RCDL模型采用最优路由选择的路由建立模型。计算路由使用从卫星边缘计算模型中识别出的选择最优路由的加密方案模型进行传输。提出的RCDL方案采用基于深度学习的强化学习方案,结合4G技术通信模型在VANET环境下进行攻击防御。仿真结果表明,本文提出的RCDL模型达到了98%的PDR值,比现有模型提高了约6%。RCDL方案对端到端时延的估计最小,提高了VANET通信性能。
{"title":"Data Security Enhancement in 4G Vehicular Networks Based on Reinforcement Learning for Satellite Edge Computing","authors":"Luis Alberto Núñez Lira, K. A. Kumari, R. Raman, Ardhariksa Zukhruf Kurniullah, Santiago Aquiles Gallarday Morales, Tula Del Carmen Espinoza Cordero","doi":"10.17762/ijcnis.v14i3.5571","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5571","url":null,"abstract":"The vehicular network provides the dedicated short-range communication (DSRC) with IEEE 802.11p standard. The VANET model comprises of cellular vehicle-to-everything communication with wireless communication technology. Vehicular Edge Computing exhibits the promising technology to provide promising Intelligent Transport System Services. Smart application and urban computing. Satellite edge computing model is adopted in vehicular networks to provide services to the VANET communication for the management of computational resources for the end-users to provide access to low latency services for maximal execution of service. The satellite edge computing model implemented with the 4G vehicular communication network model subjected to data security issues. This paper presented a Route Computation Deep Learning Model (RCDL) to improve security in VANET communication with 4G technology. The RCDL model uses the route establishment model with the optimal route selection. The compute route is transmitted with the cryptographic scheme model for the selection of optimal route identified from the satellite edge computing model. The proposed RCDL scheme uses the deep learning-based reinforcement learning scheme for the attack prevention in the VANET environment employed with the 4G technology communication model. The simulation results expressed that proposed RCDL model achieves the higher PDR value of 98% which is ~6% higher than the existing model. The estimation of end-to-end delay is minimal for the RCDL scheme and improves the VANET communication.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122300375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Autonomous Underwater Vehicle: 5G Network Design and Simulation Based on Mimetic Technique Control System 自主水下航行器:基于仿真技术控制系统的5G网络设计与仿真
Pub Date : 2022-12-23 DOI: 10.17762/ijcnis.v14i3.5566
Fidel Castro-Cayllahua, Juan Luis Meza Carhuancho, Carlos Mario Fernández Díaz, Zoila Mercedes Collantes Inga, Tariq Rasheed, J. Cotrina-Aliaga
The Internet of Underwater Things (IoUT) exhibits promising advancement with underwater acoustic wireless network communication (UWSN). Conventionally, IoUT has been utilized for the offshore monitoring and exploration of the environment within the underwater region. The data exchange between the IoUT has been performed with the 5G enabled-communication to establish the connection with the futuristic underwater monitoring. However, the acoustic waves in underwater communication are subjected to longer propagation delay and higher transmission energy. To overcome those issues autonomous underwater vehicle (AUV) is implemented for the data collection and routing based on cluster formation. This paper developed a memetic algorithm-based AUV monitoring system for the underwater environment. The proposed Autonomous 5G Memetic (A5GMEMETIC) model performs the data collection and transmission to increase the USAN performance. The A5GMEMETIC model data collection through the dynamic unaware clustering model minimizes energy consumption. The A5GMemetic optimizes the location of the nodes in the underwater environment for the optimal data path estimation for the data transmission in the network. Simulation analysis is performed comparatively with the proposed A5Gmemetic with the conventional AEDG, DGS, and HAMA models. The comparative analysis expressed that the proposed A5GMeMEMETIC model exhibits the ~12% increased packet delivery ratio (PDR), ~9% reduced delay and ~8% improved network lifetime.
随着水声无线网络通信(UWSN)的发展,水下物联网(IoUT)呈现出广阔的发展前景。传统上,IoUT主要用于水下区域环境的海上监测和勘探。IoUT之间的数据交换已通过5G启用通信进行,以建立与未来水下监测的连接。然而,声波在水下通信中具有较长的传播延迟和较高的传输能量。为了克服这些问题,自主水下航行器(AUV)实现了基于集群形成的数据收集和路由。本文开发了一种基于模因算法的水下航行器监测系统。提出的自治5G Memetic (A5GMEMETIC)模型执行数据收集和传输,以提高USAN性能。A5GMEMETIC模型通过动态无意识聚类模型收集数据,使能耗最小化。A5GMemetic对水下环境中节点的位置进行优化,以估计网络中数据传输的最优数据路径。将提出的a5genetic模型与传统的AEDG、DGS和HAMA模型进行了仿真分析。对比分析表明,提出的A5GMeMEMETIC模型的分组传送率(PDR)提高了~12%,延迟降低了~9%,网络寿命提高了~8%。
{"title":"Autonomous Underwater Vehicle: 5G Network Design and Simulation Based on Mimetic Technique Control System","authors":"Fidel Castro-Cayllahua, Juan Luis Meza Carhuancho, Carlos Mario Fernández Díaz, Zoila Mercedes Collantes Inga, Tariq Rasheed, J. Cotrina-Aliaga","doi":"10.17762/ijcnis.v14i3.5566","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5566","url":null,"abstract":"The Internet of Underwater Things (IoUT) exhibits promising advancement with underwater acoustic wireless network communication (UWSN). Conventionally, IoUT has been utilized for the offshore monitoring and exploration of the environment within the underwater region. The data exchange between the IoUT has been performed with the 5G enabled-communication to establish the connection with the futuristic underwater monitoring. However, the acoustic waves in underwater communication are subjected to longer propagation delay and higher transmission energy. To overcome those issues autonomous underwater vehicle (AUV) is implemented for the data collection and routing based on cluster formation. This paper developed a memetic algorithm-based AUV monitoring system for the underwater environment. The proposed Autonomous 5G Memetic (A5GMEMETIC) model performs the data collection and transmission to increase the USAN performance. The A5GMEMETIC model data collection through the dynamic unaware clustering model minimizes energy consumption. The A5GMemetic optimizes the location of the nodes in the underwater environment for the optimal data path estimation for the data transmission in the network. Simulation analysis is performed comparatively with the proposed A5Gmemetic with the conventional AEDG, DGS, and HAMA models. The comparative analysis expressed that the proposed A5GMeMEMETIC model exhibits the ~12% increased packet delivery ratio (PDR), ~9% reduced delay and ~8% improved network lifetime.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125255648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm for Wireless Mesh Network 基于多元宇宙优化算法的无线网状网络最优路由协议
Pub Date : 2022-12-23 DOI: 10.17762/ijcnis.v14i3.5569
P. Supraja, Anastasia Salameh, R. VaradarajuH., M. Anand, Unggul Priyadi
Wireless networks, particularly Wireless Mesh Networks (WMNs), are undergoing a significant change as a result of wireless technology advancements and the Internet's rapid expansion. Mesh routers, which have limited mobility and serve as the foundation of WMN, are made up of mesh clients and form the core of WMNs. Mesh clients can with mesh routers to create a client mesh network. Mesh clients can be either stationary or mobile. To properly utilise the network resources of WMNs, a topology must be designed that provides the best client coverage and network connectivity. Finding the ideal answer to the WMN mesh router placement dilemma will resolve this issue MRP-WMN. Since the MRP-WMN is known to be NP-hard, approximation methods are frequently used to solve it. This is another reason we are carrying out this task. Using the Multi-Verse Optimizer algorithm, we provide a quick technique for resolving the MRP-WMN (MVO). It is also proposed to create a new objective function for the MRP-WMN that accounts for the connected client ratio and connected router ratio, two crucial performance indicators. The connected client ratio rises by an average of 16.1%, 12.5%, and 6.9% according to experiment data, when the MVO method is employed to solve the MRP-WMN problem, the path loss falls by 1.3, 0.9, and 0.6 dB when compared to the Particle Swarm Optimization (PSO) and Whale Optimization Algorithm (WOA), correspondingly.
随着无线技术的进步和互联网的迅速发展,无线网络,特别是无线网状网络(WMNs)正在发生着重大的变化。Mesh路由器由Mesh客户端组成,是WMN的核心,具有有限的移动性,是WMN的基础。网状客户端可以与网状路由器一起创建一个客户端网状网络。网格客户端可以是固定的也可以是移动的。为了合理利用wmn的网络资源,必须设计一种能够提供最佳客户端覆盖和网络连通性的拓扑结构。为WMN mesh路由器的布局问题找到理想的解决方案将有助于解决MRP-WMN问题。由于已知MRP-WMN是np困难的,因此经常使用近似方法来求解它。这是我们执行这项任务的另一个原因。利用多宇宙优化算法,我们提供了一种快速求解MRP-WMN (MVO)的技术。本文还提出了为MRP-WMN创建一个新的目标函数,该函数考虑了连接的客户端比率和连接的路由器比率这两个关键的性能指标。实验数据显示,采用MVO方法解决MRP-WMN问题时,路径损耗比粒子群优化(PSO)和鲸鱼优化算法(WOA)分别降低了1.3、0.9和0.6 dB,连接客户端比率平均提高了16.1%、12.5%和6.9%。
{"title":"An Optimal Routing Protocol Using a Multiverse Optimizer Algorithm for Wireless Mesh Network","authors":"P. Supraja, Anastasia Salameh, R. VaradarajuH., M. Anand, Unggul Priyadi","doi":"10.17762/ijcnis.v14i3.5569","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i3.5569","url":null,"abstract":"Wireless networks, particularly Wireless Mesh Networks (WMNs), are undergoing a significant change as a result of wireless technology advancements and the Internet's rapid expansion. Mesh routers, which have limited mobility and serve as the foundation of WMN, are made up of mesh clients and form the core of WMNs. Mesh clients can with mesh routers to create a client mesh network. Mesh clients can be either stationary or mobile. To properly utilise the network resources of WMNs, a topology must be designed that provides the best client coverage and network connectivity. Finding the ideal answer to the WMN mesh router placement dilemma will resolve this issue MRP-WMN. Since the MRP-WMN is known to be NP-hard, approximation methods are frequently used to solve it. This is another reason we are carrying out this task. Using the Multi-Verse Optimizer algorithm, we provide a quick technique for resolving the MRP-WMN (MVO). It is also proposed to create a new objective function for the MRP-WMN that accounts for the connected client ratio and connected router ratio, two crucial performance indicators. The connected client ratio rises by an average of 16.1%, 12.5%, and 6.9% according to experiment data, when the MVO method is employed to solve the MRP-WMN problem, the path loss falls by 1.3, 0.9, and 0.6 dB when compared to the Particle Swarm Optimization (PSO) and Whale Optimization Algorithm (WOA), correspondingly.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123390193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Int. J. Commun. Networks Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1