首页 > 最新文献

Int. J. Commun. Networks Inf. Secur.最新文献

英文 中文
NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN 纳米滤出:一种改进的滤出协议,以提高无线传感器网络的性能
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5127
A. Abdulaal, A. Shah, A. Pathan
Saving energy and improving the lifetime of wireless sensor networks (WSNs) has remained as a key research challenge for some time. Low-energy adaptive clustering hierarchy (LEACH), a classical protocol is designed originally for the purpose of reducing and balancing the network’s energy consumption. However, as the distances between the cluster head (CH) and the member nodes are not taken into consideration, it results in the uneven distribution of the clusters and uneven consumption of the energy in the network. Choosing the CHs with no distinction is an issue as well. Based on the original algorithm, a novel modified LEACH (NM-LEACH) has been proposed, considering critical problems that exist in the network. NM-LEACH protocol is capable of reasonably solving the number of the CHs in each round and takes the energy as a factor of weight under consideration in selecting the CH. The proposed protocol enhances performance by extending the WSN lifecycle, which results in increasing the balance of the energy consumption in the network, and improving the efficiency of the network.
一段时间以来,节能和提高无线传感器网络(WSNs)的使用寿命一直是一个重要的研究挑战。低能量自适应聚类层次(LEACH)是一种经典的协议,最初是为了降低和平衡网络的能耗而设计的。然而,由于不考虑簇头(CH)与成员节点之间的距离,导致簇的分布不均匀,网络中的能量消耗不均匀。不加区分地选择首席执行官也是一个问题。在原有算法的基础上,考虑到网络中存在的关键问题,提出了一种新的改进的LEACH算法(NM-LEACH)。NM-LEACH协议能够合理求解每轮CH的数量,并将能量作为权重因素考虑CH的选择。所提出的协议通过延长WSN的生命周期来提高性能,从而增加网络中能量消耗的平衡,提高网络效率。
{"title":"NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN","authors":"A. Abdulaal, A. Shah, A. Pathan","doi":"10.17762/ijcnis.v14i1.5127","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5127","url":null,"abstract":"Saving energy and improving the lifetime of wireless sensor networks (WSNs) has remained as a key research challenge for some time. Low-energy adaptive clustering hierarchy (LEACH), a classical protocol is designed originally for the purpose of reducing and balancing the network’s energy consumption. However, as the distances between the cluster head (CH) and the member nodes are not taken into consideration, it results in the uneven distribution of the clusters and uneven consumption of the energy in the network. Choosing the CHs with no distinction is an issue as well. Based on the original algorithm, a novel modified LEACH (NM-LEACH) has been proposed, considering critical problems that exist in the network. NM-LEACH protocol is capable of reasonably solving the number of the CHs in each round and takes the energy as a factor of weight under consideration in selecting the CH. The proposed protocol enhances performance by extending the WSN lifecycle, which results in increasing the balance of the energy consumption in the network, and improving the efficiency of the network.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of black hole and worm hole attacks in MANETs manet中黑洞和虫洞攻击的性能分析
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5078
Mazoon Hashil Al Rubaiei, Hothefa Shaker Jassim, B. Sharef
A Mobile Ad Hoc Network MANET is composed of a freely and mobility set of mobile nodes. They form a temporary dynamic wireless network without any infrastructure. Since the nodes act as both host and router in their communication, they act as a router provide connectivity by forwarding data packets among intermediate nodes to the destination. The routing protocol is used to grove their communication and connectivity as example, the Ad On-demand distance vector (AODV) routing protocol. However, due to the lack of security vulnerabilities of routing protocols and the absence of infrastructure, MANET is vulnerable to various security threats and attacks. This paper examines the impact of two types of attacks on AODV routing protocol using Network Simulator version 2 (NS2) environment. These attacks are Blackhole and Wormhole Attacks. The aim of both of them is to prevent data packets to reach the destination node and dropping all the traffic. 
移动自组网(MANET)是由一组自由移动的移动节点组成的网络。它们形成了一个临时的动态无线网络,没有任何基础设施。由于节点在通信中既充当主机又充当路由器,因此它们充当路由器,通过在中间节点之间将数据包转发到目的地来提供连接。路由协议用于保证它们之间的通信和连通性,例如Ad按需距离矢量(AODV)路由协议。然而,由于路由协议缺乏安全漏洞和基础设施的缺失,MANET容易受到各种安全威胁和攻击。本文研究了在网络模拟器版本2 (NS2)环境下两种类型的攻击对AODV路由协议的影响。这些攻击是黑洞攻击和虫洞攻击。两者的目的都是为了防止数据包到达目的节点并丢弃所有流量。
{"title":"Performance analysis of black hole and worm hole attacks in MANETs","authors":"Mazoon Hashil Al Rubaiei, Hothefa Shaker Jassim, B. Sharef","doi":"10.17762/ijcnis.v14i1.5078","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5078","url":null,"abstract":"A Mobile Ad Hoc Network MANET is composed of a freely and mobility set of mobile nodes. They form a temporary dynamic wireless network without any infrastructure. Since the nodes act as both host and router in their communication, they act as a router provide connectivity by forwarding data packets among intermediate nodes to the destination. The routing protocol is used to grove their communication and connectivity as example, the Ad On-demand distance vector (AODV) routing protocol. However, due to the lack of security vulnerabilities of routing protocols and the absence of infrastructure, MANET is vulnerable to various security threats and attacks. This paper examines the impact of two types of attacks on AODV routing protocol using Network Simulator version 2 (NS2) environment. These attacks are Blackhole and Wormhole Attacks. The aim of both of them is to prevent data packets to reach the destination node and dropping all the traffic. ","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131033726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Aware Routing for Wireless Sensor Networks 无线传感器网络的能量感知路由
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5215
Marvy Badr Monir, Amr Ayman Mohamed
Wireless sensor networks are used in improving conditions in the practical field and real life which lead researchers and developers to further research it and work into improving this field. These networks consist of sensor nodes that can help acquire data and information about temperature and pressure dependent on the environment of the location which are sent from. After all that, we are bounded by a really important factor which can determine everything which is Energy. Since sensor nodes send data and information to web applications, they need an energy source to operate. Their main energy source is their batteries which offer limited source of energy. Hence, various protocols are introduced to help in many parameters of a wireless sensor network such as increasing lifetime and decreasing consumption of energy, in other words, increasing the Energy Efficiency (EF). In this paper, we evaluate consumption of average energy for various protocols used in this context after each complete logical round for these protocols, such as Energy Efficient Clustering Scheme and Stable Election Protocol. Finally, we used Matlab tool to generate results which indicate that the protocol used in this paper is efficient and reliable.
无线传感器网络用于改善实际领域和现实生活中的条件,这促使研究人员和开发人员进一步研究并努力改善这一领域。这些网络由传感器节点组成,可以根据发送位置的环境帮助获取有关温度和压力的数据和信息。在所有这些之后,我们被一个非常重要的因素所限制,这个因素可以决定一切,那就是能量。由于传感器节点向web应用程序发送数据和信息,因此它们需要能源来运行。它们的主要能源是电池,而电池提供的能源有限。因此,引入了各种协议来帮助无线传感器网络的许多参数,例如增加寿命和减少能源消耗,换句话说,提高能源效率(EF)。在本文中,我们评估了在这种情况下使用的各种协议在每个完成逻辑回合后的平均能量消耗,例如节能聚类方案和稳定选举协议。最后,我们使用Matlab工具生成结果,表明本文使用的协议是高效可靠的。
{"title":"Energy Aware Routing for Wireless Sensor Networks","authors":"Marvy Badr Monir, Amr Ayman Mohamed","doi":"10.17762/ijcnis.v14i1.5215","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5215","url":null,"abstract":"Wireless sensor networks are used in improving conditions in the practical field and real life which lead researchers and developers to further research it and work into improving this field. These networks consist of sensor nodes that can help acquire data and information about temperature and pressure dependent on the environment of the location which are sent from. After all that, we are bounded by a really important factor which can determine everything which is Energy. Since sensor nodes send data and information to web applications, they need an energy source to operate. Their main energy source is their batteries which offer limited source of energy. Hence, various protocols are introduced to help in many parameters of a wireless sensor network such as increasing lifetime and decreasing consumption of energy, in other words, increasing the Energy Efficiency (EF). In this paper, we evaluate consumption of average energy for various protocols used in this context after each complete logical round for these protocols, such as Energy Efficient Clustering Scheme and Stable Election Protocol. Finally, we used Matlab tool to generate results which indicate that the protocol used in this paper is efficient and reliable.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130676813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks 类似于ELGAMAL的密码系统,但可以抵抗后量子攻击
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5180
Ahmed El-Yahyaoui, F. Omary
The Modulo 1 Factoring Problem (M1FP) is an elegant mathematical problem which could be exploited to design safe cryptographic protocols and encryption schemes that resist to post quantum attacks. The ELGAMAL encryption scheme is a well-known and efficient public key algorithm designed by Taher ELGAMAL from discrete logarithm problem. It is always highly used in Internet security and many other applications after a large number of years. However, the imminent arrival of quantum computing threatens the security of ELGAMAL cryptosystem and impose to cryptologists to prepare a resilient algorithm to quantum computer-based attacks. In this paper we will present a like-ELGAMAL cryptosystem based on the M1FP NP-hard problem. This encryption scheme is very simple but efficient and supposed to be resistant to post quantum attacks.
模1分解问题(M1FP)是一个优雅的数学问题,可以用来设计安全的加密协议和加密方案,以抵抗后量子攻击。ELGAMAL加密方案是Taher ELGAMAL根据离散对数问题设计的一种知名的高效公钥算法。经过多年的发展,它一直在互联网安全和许多其他应用中得到高度应用。然而,即将到来的量子计算威胁到ELGAMAL密码系统的安全性,并迫使密码学家准备一个有弹性的算法来应对基于量子计算机的攻击。在本文中,我们将提出一个基于M1FP np难题的类elgamal密码系统。这种加密方案非常简单,但效率很高,可以抵抗后量子攻击。
{"title":"A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks","authors":"Ahmed El-Yahyaoui, F. Omary","doi":"10.17762/ijcnis.v14i1.5180","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5180","url":null,"abstract":"The Modulo 1 Factoring Problem (M1FP) is an elegant mathematical problem which could be exploited to design safe cryptographic protocols and encryption schemes that resist to post quantum attacks. The ELGAMAL encryption scheme is a well-known and efficient public key algorithm designed by Taher ELGAMAL from discrete logarithm problem. It is always highly used in Internet security and many other applications after a large number of years. However, the imminent arrival of quantum computing threatens the security of ELGAMAL cryptosystem and impose to cryptologists to prepare a resilient algorithm to quantum computer-based attacks. In this paper we will present a like-ELGAMAL cryptosystem based on the M1FP NP-hard problem. This encryption scheme is very simple but efficient and supposed to be resistant to post quantum attacks.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN IPSEC VPN中NAT穿越的高吞吐量硬件实现
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5260
Tran Sy Nam, Van‐Phuc Hoang, Nguyen Van Long
In this paper, we present a high-throughput FPGA implementation of IPSec core. The core supports both NAT and non-NAT mode and can be used in high speed security gateway devices. Although IPSec ESP is very computing intensive for its cryptography process, our implementation shows that it can achieve high throughput and low lantency. The system is realized on the Zynq XC7Z045 from Xilinx and was verified and tested in practice. Results show that the design can gives a peak throughput of 5.721 Gbps for the IPSec ESP tunnel mode in NAT mode and 7.753 Gbps in non-NAT mode using one single AES encrypt core. We also compare the performance of the core when running in other mode of encryption.
在本文中,我们提出了一个高吞吐量的FPGA实现IPSec核心。该核心支持NAT和非NAT两种方式,可用于高速安全网关设备。虽然IPSec ESP在加密过程中需要大量的计算,但我们的实现表明它可以实现高吞吐量和低延迟。该系统在赛灵思公司的Zynq XC7Z045单片机上实现,并在实践中进行了验证和测试。结果表明,该设计在NAT模式下IPSec ESP隧道模式的峰值吞吐量为5.721 Gbps,在非NAT模式下使用单个AES加密核的峰值吞吐量为7.753 Gbps。我们还比较了内核在其他加密模式下运行时的性能。
{"title":"A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN","authors":"Tran Sy Nam, Van‐Phuc Hoang, Nguyen Van Long","doi":"10.17762/ijcnis.v14i1.5260","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5260","url":null,"abstract":"In this paper, we present a high-throughput FPGA implementation of IPSec core. The core supports both NAT and non-NAT mode and can be used in high speed security gateway devices. Although IPSec ESP is very computing intensive for its cryptography process, our implementation shows that it can achieve high throughput and low lantency. The system is realized on the Zynq XC7Z045 from Xilinx and was verified and tested in practice. Results show that the design can gives a peak throughput of 5.721 Gbps for the IPSec ESP tunnel mode in NAT mode and 7.753 Gbps in non-NAT mode using one single AES encrypt core. We also compare the performance of the core when running in other mode of encryption.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131843524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight Scheme for Smart Home Environments using Offloading Technique 基于卸载技术的智能家居环境轻量化方案
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5065
Ahmad A. Al-Daraiseh, Rasel Chowdhury, Hakima Ould-Slimane, C. Talhi, M. Taha
Internet of Things (IoT) as an emerging technology has been transforming the different aspects of our world from simple preprogrammed coffee machine to smart farming. Due to the human nature to simplify and ease of living, human are becoming dependent on these automated IoT devices and smart environments like smart phones, wearable devices, smart home and etc. In order to provide better QoS, these devices needs to work together and share data among them, also to the service providers and the cloud. Since these devices are resource constrained, IoT technology heavily depends on the cloud for processing, analytics and storage. But these data coming from the devices contains lot of personal identity information (PII). Almost all the time, the users of these devices are unaware of these information that is being transmitted or they do not possess the control over the data that they are being sent to the service provider, as well as to the cloud. Even the cloud services and service providers are secured but they are always curious. There are lot of security measures implemented for end to end communication but IoT lacks the mechanism for securing the data that the devices are generating along with access control. In this article we are proposing an approach for the security, privacy and access control of user data using Attribute Based Encryption (ABE) in smart home as the case study.
物联网(IoT)作为一项新兴技术已经改变了我们世界的各个方面,从简单的预编程咖啡机到智能农业。由于人类对生活的简化和安逸的天性,人类越来越依赖这些自动化的物联网设备和智能环境,如智能手机、可穿戴设备、智能家居等。为了提供更好的QoS,这些设备需要协同工作并在它们之间共享数据,也需要向服务提供商和云共享数据。由于这些设备资源有限,物联网技术在很大程度上依赖于云进行处理、分析和存储。但是这些来自设备的数据包含了大量的个人身份信息(PII)。几乎所有时候,这些设备的用户都不知道正在传输的这些信息,或者他们无法控制发送给服务提供商和云的数据。即使是云服务和服务提供商也是安全的,但他们总是很好奇。端到端通信实施了许多安全措施,但物联网缺乏保护设备生成的数据以及访问控制的机制。本文以智能家居中基于属性的加密(ABE)技术为例,提出了一种实现用户数据安全、隐私和访问控制的方法。
{"title":"Lightweight Scheme for Smart Home Environments using Offloading Technique","authors":"Ahmad A. Al-Daraiseh, Rasel Chowdhury, Hakima Ould-Slimane, C. Talhi, M. Taha","doi":"10.17762/ijcnis.v14i1.5065","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5065","url":null,"abstract":"Internet of Things (IoT) as an emerging technology has been transforming the different aspects of our world from simple preprogrammed coffee machine to smart farming. Due to the human nature to simplify and ease of living, human are becoming dependent on these automated IoT devices and smart environments like smart phones, wearable devices, smart home and etc. In order to provide better QoS, these devices needs to work together and share data among them, also to the service providers and the cloud. Since these devices are resource constrained, IoT technology heavily depends on the cloud for processing, analytics and storage. But these data coming from the devices contains lot of personal identity information (PII). Almost all the time, the users of these devices are unaware of these information that is being transmitted or they do not possess the control over the data that they are being sent to the service provider, as well as to the cloud. Even the cloud services and service providers are secured but they are always curious. There are lot of security measures implemented for end to end communication but IoT lacks the mechanism for securing the data that the devices are generating along with access control. In this article we are proposing an approach for the security, privacy and access control of user data using Attribute Based Encryption (ABE) in smart home as the case study.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on Precoding Techniques For mm-Wave Massive MIMO Wireless Systems 毫米波大规模MIMO无线系统预编码技术研究进展
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5206
Islam Osama, M. Rihan, M. Elhefnawy, S. Eldolil, H. Malhat
The growing demands for high data rate wireless connectivity shed lights on the fact that appropriate spectrum regions need to be investigated so that the expected future needs will be satisfied. With this in mind, the research community has shown considerable interest in millimeter-wave (mm-wave) communication. Generally, hybrid transceivers combining the analog phase shifter and the RF chains with digital signal processing (DSP) systems are used for MIMO communication in the fifth generation (5G) wireless networks. This paper presents a survey for different precoding or beamforming techniques that have been proposed in the literature. These beamforming techniques are mainly classified based on their hardware structure into analog and digital beamforming. To reduce the hardware complexity and power consumption, the hybrid precoding techniques that combine analog and digital beamforming can be implemented for mm-wave massive MIMO wireless systems. The performance of the most common hybrid precoding algorithms has been investigated in this paper.
对高数据速率无线连接日益增长的需求表明,需要研究合适的频谱区域,以满足预期的未来需求。考虑到这一点,研究界对毫米波通信表现出相当大的兴趣。在第五代(5G)无线网络中,MIMO通信通常采用将模拟移相器和射频链与数字信号处理(DSP)系统相结合的混合收发器。本文综述了文献中提出的不同的预编码或波束形成技术。这些波束形成技术根据其硬件结构主要分为模拟波束形成和数字波束形成。为了降低硬件复杂度和功耗,将模拟波束形成和数字波束形成相结合的混合预编码技术可用于毫米波大规模MIMO无线系统。本文研究了最常用的混合预编码算法的性能。
{"title":"A review on Precoding Techniques For mm-Wave Massive MIMO Wireless Systems","authors":"Islam Osama, M. Rihan, M. Elhefnawy, S. Eldolil, H. Malhat","doi":"10.17762/ijcnis.v14i1.5206","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5206","url":null,"abstract":"The growing demands for high data rate wireless connectivity shed lights on the fact that appropriate spectrum regions need to be investigated so that the expected future needs will be satisfied. With this in mind, the research community has shown considerable interest in millimeter-wave (mm-wave) communication. Generally, hybrid transceivers combining the analog phase shifter and the RF chains with digital signal processing (DSP) systems are used for MIMO communication in the fifth generation (5G) wireless networks. This paper presents a survey for different precoding or beamforming techniques that have been proposed in the literature. These beamforming techniques are mainly classified based on their hardware structure into analog and digital beamforming. To reduce the hardware complexity and power consumption, the hybrid precoding techniques that combine analog and digital beamforming can be implemented for mm-wave massive MIMO wireless systems. The performance of the most common hybrid precoding algorithms has been investigated in this paper.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114584539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A predictive User behaviour analytic Model for Insider Threats in Cyberspace 网络空间内部威胁的预测性用户行为分析模型
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5208
Olarotimi Kabir Amuda, B. Akinyemi, M. Sanni, Ganiyu A. Aderounmu
Insider threat in cyberspace is a recurring problem since the user activities in a cyber network are often unpredictable. Most existing solutions are not flexible and adaptable to detect sudden change in user’s behaviour in streaming data, which led to a high false alarm rates and low detection rates. In this study, a model that is capable of adapting to the changing pattern in structured cyberspace data streams in order to detect malicious insider activities in cyberspace was proposed. The Computer Emergency Response Team (CERT) dataset was used as the data source in this study. Extracted features from the dataset were normalized using Min-Max normalization. Standard scaler techniques and mutual information gain technique were used to determine the best features for classification. A hybrid detection model was formulated using the synergism of Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) models. Model simulation was performed using python programming language. Performance evaluation was carried out by assessing and comparing the performance of the proposed model with a selected existing model using accuracy, precision and sensitivity as performance metrics. The result of the simulation showed that the developed model has an increase of 1.48% of detection accuracy, 4.21% of precision and 1.25% sensitivity over the existing model. This indicated that the developed hybrid approach was able to learn from sequences of user actions in a time and frequency domain and improves the detection rate of insider threats in cyberspace.
网络空间的内部威胁是一个反复出现的问题,因为用户在网络中的活动往往是不可预测的。大多数现有的解决方案在检测流数据中用户行为的突然变化方面缺乏灵活性和适应性,导致虚警率高,检测率低。本文提出了一种能够适应结构化网络空间数据流模式变化的网络空间恶意内部活动检测模型。本研究使用计算机应急响应小组(CERT)数据集作为数据源。从数据集中提取的特征使用Min-Max归一化进行归一化。采用标准尺度技术和互信息增益技术确定最佳特征进行分类。利用卷积神经网络(CNN)和门控循环单元(GRU)模型的协同作用,建立了混合检测模型。采用python编程语言对模型进行仿真。以准确度、精密度和灵敏度为性能指标,对所提出模型的性能与选定的现有模型进行评估和比较,从而进行性能评估。仿真结果表明,与现有模型相比,该模型的检测精度提高1.48%,精度提高4.21%,灵敏度提高1.25%。这表明所开发的混合方法能够从时间和频率域的用户动作序列中学习,并提高了网络空间内部威胁的检测率。
{"title":"A predictive User behaviour analytic Model for Insider Threats in Cyberspace","authors":"Olarotimi Kabir Amuda, B. Akinyemi, M. Sanni, Ganiyu A. Aderounmu","doi":"10.17762/ijcnis.v14i1.5208","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5208","url":null,"abstract":"Insider threat in cyberspace is a recurring problem since the user activities in a cyber network are often unpredictable. Most existing solutions are not flexible and adaptable to detect sudden change in user’s behaviour in streaming data, which led to a high false alarm rates and low detection rates. In this study, a model that is capable of adapting to the changing pattern in structured cyberspace data streams in order to detect malicious insider activities in cyberspace was proposed. The Computer Emergency Response Team (CERT) dataset was used as the data source in this study. Extracted features from the dataset were normalized using Min-Max normalization. Standard scaler techniques and mutual information gain technique were used to determine the best features for classification. A hybrid detection model was formulated using the synergism of Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) models. Model simulation was performed using python programming language. Performance evaluation was carried out by assessing and comparing the performance of the proposed model with a selected existing model using accuracy, precision and sensitivity as performance metrics. The result of the simulation showed that the developed model has an increase of 1.48% of detection accuracy, 4.21% of precision and 1.25% sensitivity over the existing model. This indicated that the developed hybrid approach was able to learn from sequences of user actions in a time and frequency domain and improves the detection rate of insider threats in cyberspace.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128664231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRW-MAC: A thermal-aware receiver-driven wake-up radio enabled duty cycle MAC protocol for multi-hop implantable wireless body area networks in Internet of Things TRW-MAC:一种热感知接收器驱动的唤醒无线电占空比MAC协议,用于物联网中多跳植入式无线体域网络
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5182
M. Monowar
Implantable Wireless Body Area Network (IWBAN), a network of implantable medical sensors, is one of the emerging network paradigms due to the rapid proliferation of wireless technologies and growing demand of sophisticated healthcare. The wireless sensors in IWBAN is capable of communicating with each other through radio frequency (RF) link. However, recurring wireless communication inside the human body induces heat causing severe thermal damage to the human tissue which, if not controlled, may appear as a threat to human life. Moreover, higher propagation loss inside the human body as well as low-power requirement of the sensor nodes necessitate multi-hop communication for IWBAN. A IWBAN also requires meeting certain Quality of Service demands in terms of energy, delay, reliability etc. These pressing concerns engender the design of TRW-MAC: A thermal-aware receiver-driven wake-up radio enabled duty cycle MAC protocol for multi-hop IWBANs in Internet of Things. TRW-MAC introduces a thermal-aware duty cycle adjustment mechanism to reduce temperature inside the body and adopts wake-up radio (WuR) scheme for attaining higher energy efficiency. The protocol devises a wake-up estimation scheme to facilitate staggered wake-up schedule for multi-hop transmission. A superframe structure is introduced that utilizes both contention-based and contention free medium access operations. The performance of TRW-MAC is evaluated through simulations that exhibit its superior performance in attaining lower thermal-rise as well as satisfying other QoS metrics in terms of energy-efficiency, delay and reliability.
植入式无线体域网络(IWBAN)是一种植入式医疗传感器网络,由于无线技术的快速发展和复杂医疗需求的不断增长,是新兴的网络范式之一。IWBAN中的无线传感器能够通过射频链路相互通信。然而,人体内反复出现的无线通信会产生热量,对人体组织造成严重的热损伤,如果不加以控制,可能会对人的生命构成威胁。此外,人体内部较高的传播损耗和传感器节点的低功耗要求使得IWBAN需要进行多跳通信。IWBAN还要求在能源、延迟、可靠性等方面满足一定的服务质量要求。这些紧迫的问题产生了TRW-MAC的设计:一种热感知接收器驱动的唤醒无线电占空比MAC协议,用于物联网中的多跳iwban。TRW-MAC引入热感知占空比调节机制,以降低体内温度,并采用唤醒无线电(WuR)方案,以获得更高的能源效率。该协议设计了一种唤醒估计方案,以方便多跳传输的交错唤醒调度。介绍了一种利用基于争用和无争用的介质访问操作的超帧结构。通过仿真对TRW-MAC的性能进行了评估,表明其在获得较低的热升以及在能效、延迟和可靠性方面满足其他QoS指标方面具有优越的性能。
{"title":"TRW-MAC: A thermal-aware receiver-driven wake-up radio enabled duty cycle MAC protocol for multi-hop implantable wireless body area networks in Internet of Things","authors":"M. Monowar","doi":"10.17762/ijcnis.v14i1.5182","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5182","url":null,"abstract":"Implantable Wireless Body Area Network (IWBAN), a network of implantable medical sensors, is one of the emerging network paradigms due to the rapid proliferation of wireless technologies and growing demand of sophisticated healthcare. The wireless sensors in IWBAN is capable of communicating with each other through radio frequency (RF) link. However, recurring wireless communication inside the human body induces heat causing severe thermal damage to the human tissue which, if not controlled, may appear as a threat to human life. Moreover, higher propagation loss inside the human body as well as low-power requirement of the sensor nodes necessitate multi-hop communication for IWBAN. A IWBAN also requires meeting certain Quality of Service demands in terms of energy, delay, reliability etc. These pressing concerns engender the design of TRW-MAC: A thermal-aware receiver-driven wake-up radio enabled duty cycle MAC protocol for multi-hop IWBANs in Internet of Things. TRW-MAC introduces a thermal-aware duty cycle adjustment mechanism to reduce temperature inside the body and adopts wake-up radio (WuR) scheme for attaining higher energy efficiency. The protocol devises a wake-up estimation scheme to facilitate staggered wake-up schedule for multi-hop transmission. A superframe structure is introduced that utilizes both contention-based and contention free medium access operations. The performance of TRW-MAC is evaluated through simulations that exhibit its superior performance in attaining lower thermal-rise as well as satisfying other QoS metrics in terms of energy-efficiency, delay and reliability.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Building of a Powerful IDS for The Cloud Based on Deep Neural Network by Using a Novel Combination of Simulated Annealing Algorithm and Improved Self- Adaptive Genetic Algorithm 采用模拟退火算法和改进的自适应遗传算法相结合的深度神经网络自动构建强大的云入侵检测系统
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5264
Z. Chiba, Moulay Seddiq El Kasmi Alaoui, N. Abghour, K. Moussaid
Cloud computing (CC) is the fastest-growing data hosting and computational technology that stands today as a satisfactory answer to the problem of data storage and computing. Thereby, most organizations are now migratingtheir services into the cloud due to its appealing features and its tangible advantages. Nevertheless, providing privacy and security to protect cloud assets and resources still a very challenging issue. To address the aboveissues, we propose a smart approach to construct automatically an efficient and effective anomaly network IDS based on Deep Neural Network, by using a novel hybrid optimization framework “ISAGASAA”. ISAGASAA framework combines our new self-adaptive heuristic search algorithm called “Improved Self-Adaptive Genetic Algorithm” (ISAGA) and Simulated Annealing Algorithm (SAA). Our approach consists of using ISAGASAA with the aim of seeking the optimal or near optimal combination of most pertinent values of the parametersincluded in building of DNN based IDS or impacting its performance, which guarantee high detection rate, high accuracy and low false alarm rate. The experimental results turn out the capability of our IDS to uncover intrusionswith high detection accuracy and low false alarm rate, and demonstrate its superiority in comparison with stateof-the-art methods.
云计算(CC)是增长最快的数据托管和计算技术,它是当今数据存储和计算问题的一个令人满意的答案。因此,由于云的吸引人的特性和切实的优势,大多数组织现在都将他们的服务迁移到云上。然而,提供隐私和安全性来保护云资产和资源仍然是一个非常具有挑战性的问题。针对上述问题,本文提出了一种基于深度神经网络的自动构建高效异常网络IDS的智能方法,该方法采用了一种新型的混合优化框架“ISAGASAA”。ISAGASAA框架结合了我们新的自适应启发式搜索算法“改进自适应遗传算法”(ISAGA)和模拟退火算法(SAA)。我们的方法包括使用ISAGASAA,目的是寻求基于DNN的IDS构建或影响其性能的参数中最相关值的最优或接近最优组合,从而保证高检测率,高精度和低虚警率。实验结果表明,该入侵检测系统具有较高的检测精度和较低的误报率,与现有的入侵检测方法相比具有一定的优越性。
{"title":"Automatic Building of a Powerful IDS for The Cloud Based on Deep Neural Network by Using a Novel Combination of Simulated Annealing Algorithm and Improved Self- Adaptive Genetic Algorithm","authors":"Z. Chiba, Moulay Seddiq El Kasmi Alaoui, N. Abghour, K. Moussaid","doi":"10.17762/ijcnis.v14i1.5264","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5264","url":null,"abstract":"Cloud computing (CC) is the fastest-growing data hosting and computational technology that stands today as a satisfactory answer to the problem of data storage and computing. Thereby, most organizations are now migratingtheir services into the cloud due to its appealing features and its tangible advantages. Nevertheless, providing privacy and security to protect cloud assets and resources still a very challenging issue. To address the aboveissues, we propose a smart approach to construct automatically an efficient and effective anomaly network IDS based on Deep Neural Network, by using a novel hybrid optimization framework “ISAGASAA”. ISAGASAA framework combines our new self-adaptive heuristic search algorithm called “Improved Self-Adaptive Genetic Algorithm” (ISAGA) and Simulated Annealing Algorithm (SAA). Our approach consists of using ISAGASAA with the aim of seeking the optimal or near optimal combination of most pertinent values of the parametersincluded in building of DNN based IDS or impacting its performance, which guarantee high detection rate, high accuracy and low false alarm rate. The experimental results turn out the capability of our IDS to uncover intrusionswith high detection accuracy and low false alarm rate, and demonstrate its superiority in comparison with stateof-the-art methods.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121513982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Int. J. Commun. Networks Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1