首页 > 最新文献

Int. J. Commun. Networks Inf. Secur.最新文献

英文 中文
Improved Technique for Preserving Privacy while Mining Real Time Big Data 实时大数据挖掘中隐私保护的改进技术
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5187
Ila Chandrakar
With the evolution of Big data, data owners require the assistance of a third party (e.g.,cloud) to store, analyse the data and obtain information at a lower cost. However, maintaining privacy is a challenge in such scenarios. It may reveal sensitive information. The existing research discusses different techniques to implement privacy in original data using anonymization, randomization, and suppression techniques. But those techniques are not scalable, suffers from information loss, does not support real time data and hence not suitable for privacy preserving big data mining. In this research, a novel approach of two level privacy is proposed using pseudonymization and homomorphic encryption in spark framework. Several simulations are carried out on the collected dataset. Through the results obtained, we observed that execution time is reduced by 50%, privacy is enhanced by 10%. This scheme is suitable for both privacy preserving Big Data publishing and mining.
随着大数据的发展,数据所有者需要第三方(如云)的协助,以较低的成本存储、分析数据并获取信息。然而,在这种情况下,维护隐私是一个挑战。它可能会泄露敏感信息。现有的研究讨论了使用匿名化、随机化和抑制技术来实现原始数据隐私的不同技术。但这些技术缺乏可扩展性,存在信息丢失、不支持实时数据等问题,不适合保护隐私的大数据挖掘。本文提出了一种在spark框架下使用假名和同态加密实现两级隐私的新方法。在收集的数据集上进行了多次模拟。通过获得的结果,我们观察到执行时间减少了50%,隐私性增强了10%。该方案既适用于保护隐私的大数据发布,也适用于数据挖掘。
{"title":"Improved Technique for Preserving Privacy while Mining Real Time Big Data","authors":"Ila Chandrakar","doi":"10.17762/ijcnis.v14i1.5187","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5187","url":null,"abstract":"With the evolution of Big data, data owners require the assistance of a third party (e.g.,cloud) to store, analyse the data and obtain information at a lower cost. However, maintaining privacy is a challenge in such scenarios. It may reveal sensitive information. The existing research discusses different techniques to implement privacy in original data using anonymization, randomization, and suppression techniques. But those techniques are not scalable, suffers from information loss, does not support real time data and hence not suitable for privacy preserving big data mining. In this research, a novel approach of two level privacy is proposed using pseudonymization and homomorphic encryption in spark framework. Several simulations are carried out on the collected dataset. Through the results obtained, we observed that execution time is reduced by 50%, privacy is enhanced by 10%. This scheme is suitable for both privacy preserving Big Data publishing and mining.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132843369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security Improvements for Connected Vehicles Position-Based Routing 基于位置路由的互联车辆安全性改进
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.4953
Andrey Silva
The constant growing on the number of vehicles is increasing the complexity of traffic in urban and highway environments. It is paramount to improve traffic management to guarantee better road usage and people’s safety. Through efficient communications, Vehicular Ad hoc Networks (VANETs) can provide enough information for traffic safety initiatives, daily traffic data processing, and entertainment information. However, VANETs are vulnerable to malicious nodes applying different types of net-work attacks, where an attacker can, for instance, forge its position to receive the data packet and drop the message. This can lead vehicles and authorities to make incorrect assumptions and decisions, which can result in dangerous situations. Therefore, any data dissemination protocol designed for VANET should consider security issues when selecting the next-hop forwarding node. In this paper, we propose a security scheme designed for position-based routing algorithms, which analyzes nodes position, transmission range, and hello packet interval. The scheme deals with malicious nodes performing network attacks, faking their positions forcing packets to be dropped. We used the Simulation of Urban MObility (SUMO) and Network Simulator-version 3 (NS-3) to compare our proposed scheme integrated with two well-known position-based algorithms. The results were collected in an urban Manhattan grid environment varying the number of nodes, the number of malicious nodes, as well as the number of source-destination pairs. The results show that the proposed security scheme can successfully improve the packet delivery ratio while maintaining low average end-to-end delay of the algorithms. 
随着车辆数量的不断增长,城市和公路交通环境的复杂性日益增加。改善交通管理以保证更好的道路使用和人员安全是至关重要的。通过高效的通信,车辆自组织网络(VANETs)可以为交通安全举措、日常交通数据处理和娱乐信息提供足够的信息。然而,vanet很容易受到应用不同类型网络攻击的恶意节点的攻击,例如,攻击者可以伪造其位置来接收数据包并丢弃消息。这可能导致车辆和当局做出错误的假设和决定,从而导致危险的情况。因此,任何为VANET设计的数据传播协议在选择下一跳转发节点时都要考虑安全性问题。本文提出了一种基于位置路由算法的安全方案,该方案分析了节点位置、传输范围和hello包间隔。该方案处理执行网络攻击的恶意节点,伪造其位置迫使数据包被丢弃。我们使用城市交通模拟(SUMO)和网络模拟器版本3 (NS-3)来比较我们提出的方案与两种知名的基于位置的算法。结果是在曼哈顿城市网格环境中收集的,该环境改变了节点的数量、恶意节点的数量以及源-目标对的数量。结果表明,所提出的安全方案在保持较低的端到端平均时延的同时,成功地提高了包的投递率。
{"title":"Security Improvements for Connected Vehicles Position-Based Routing","authors":"Andrey Silva","doi":"10.54039/ijcnis.v13i3.4953","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.4953","url":null,"abstract":"The constant growing on the number of vehicles is increasing the complexity of traffic in urban and highway environments. It is paramount to improve traffic management to guarantee better road usage and people’s safety. Through efficient communications, Vehicular Ad hoc Networks (VANETs) can provide enough information for traffic safety initiatives, daily traffic data processing, and entertainment information. However, VANETs are vulnerable to malicious nodes applying different types of net-work attacks, where an attacker can, for instance, forge its position to receive the data packet and drop the message. This can lead vehicles and authorities to make incorrect assumptions and decisions, which can result in dangerous situations. Therefore, any data dissemination protocol designed for VANET should consider security issues when selecting the next-hop forwarding node. In this paper, we propose a security scheme designed for position-based routing algorithms, which analyzes nodes position, transmission range, and hello packet interval. The scheme deals with malicious nodes performing network attacks, faking their positions forcing packets to be dropped. We used the Simulation of Urban MObility (SUMO) and Network Simulator-version 3 (NS-3) to compare our proposed scheme integrated with two well-known position-based algorithms. The results were collected in an urban Manhattan grid environment varying the number of nodes, the number of malicious nodes, as well as the number of source-destination pairs. The results show that the proposed security scheme can successfully improve the packet delivery ratio while maintaining low average end-to-end delay of the algorithms. ","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125529198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs) 信道传播特性对高原4G蜂窝系统性能的影响
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5133
Kabiru Yusuf, D. S. Shuaibu, S. A. Babale
In this paper, we investigated the effect of different channel propagation characteristics on the performance of 4G systems from high altitude platforms (HAPs). The use of High-Altitude Platforms for communication purpose in the past focused mostly on the assumption that the platform is quasi stationary. The technical limitation of the assumption was that of ensuring stability in the positioning of the platform in space. The use of antenna steering and other approaches were proposed as a solution to the said problem. In this paper, we proposed a channel model which account for the motion of the platform. This was done by investigating the effect of Doppler shift on the carrier frequency as the signals propagate between the transmitter and receiver while the High-Altitude Platform is in motion. The basic free space model was used and subjected to the frequency variation caused by the continuous random shift due to the motion of the HAPs. The trajectory path greatly affects the system performance. A trajectory of 30km, 100km and 500km radii were simulated. An acute elevation angle was used in the simulation. The proposed model was also compared to two other channel models to illustrate its performance. The results show that the proposed model behave similar to the existing models except at base station ID 35 and 45 where the highest deviation of 20dBm was observed. Other stations that deviated were less than 2dBm.
在本文中,我们研究了不同信道传播特性对来自高空平台(HAPs)的4G系统性能的影响。过去使用高空平台进行通信主要集中在假定平台是准静止的。这一假设的技术限制在于无法确保平台在空间中的定位稳定性。提出了利用天线转向和其他方法来解决上述问题。在本文中,我们提出了一个考虑平台运动的通道模型。这是通过研究信号在发射机和接收机之间传播时多普勒频移对载波频率的影响来完成的,而高空平台处于运动状态。采用基本自由空间模型,并对其运动引起的连续随机位移引起的频率变化进行了分析。弹道路径对系统性能影响很大。模拟了半径为30公里、100公里和500公里的弹道。仿真中采用锐角俯仰角。本文还将该模型与另外两种信道模型进行了比较,以说明其性能。结果表明,除了在基地台ID 35和基地台ID 45处观测到的最大偏差为20dBm外,所提模型的性能与现有模型相似。其他电台的偏差小于2dBm。
{"title":"Channel Propagation Characteristics on the Performance of 4G Cellular Systems from High Altitude Platforms (HAPs)","authors":"Kabiru Yusuf, D. S. Shuaibu, S. A. Babale","doi":"10.54039/ijcnis.v13i3.5133","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5133","url":null,"abstract":"In this paper, we investigated the effect of different channel propagation characteristics on the performance of 4G systems from high altitude platforms (HAPs). The use of High-Altitude Platforms for communication purpose in the past focused mostly on the assumption that the platform is quasi stationary. The technical limitation of the assumption was that of ensuring stability in the positioning of the platform in space. The use of antenna steering and other approaches were proposed as a solution to the said problem. In this paper, we proposed a channel model which account for the motion of the platform. This was done by investigating the effect of Doppler shift on the carrier frequency as the signals propagate between the transmitter and receiver while the High-Altitude Platform is in motion. The basic free space model was used and subjected to the frequency variation caused by the continuous random shift due to the motion of the HAPs. The trajectory path greatly affects the system performance. A trajectory of 30km, 100km and 500km radii were simulated. An acute elevation angle was used in the simulation. The proposed model was also compared to two other channel models to illustrate its performance. The results show that the proposed model behave similar to the existing models except at base station ID 35 and 45 where the highest deviation of 20dBm was observed. Other stations that deviated were less than 2dBm.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114320443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment 物联网环境下指纹模板加密的改进块预处理算法
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5101
N. Katuk, Ikenna Rene Chiadighikaobi
Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many zero blocks that lead to a pattern and make it easier for attackers to obtain an encryption key. Thus, this research proposed header and zero blocks bypass method during the block pre-processing to overcome this problem. First, the original PRESENT algorithm was enhanced by incorporating the block pre-processing phase. Then, the algorithm’s performance was tested using three measures: time, memory usage, and CPU usage for encrypting and decrypting fingerprint templates. This study demonstrated that the proposed method encrypted and decrypted the fingerprint templates faster with the same CPU usage of the original algorithm but consumed higher memory. Thus, it has the potential to be used in IoT environments for security.
许多先前的研究已经证明PRESENT算法是超轻量级加密。因此,它适合在物联网环境中使用。然而,像PRESENT这样的块加密算法的主要问题是,它会导致攻击者破解加密密钥。在指纹模板的上下文中,它包含一个头和许多零块,这些零块导致一个模式,使攻击者更容易获得加密密钥。因此,本研究在数据块预处理过程中提出了头和零块绕过的方法来克服这一问题。首先,通过加入块预处理阶段对原有的PRESENT算法进行了改进。然后,使用加密和解密指纹模板的时间、内存使用和CPU使用三个指标来测试算法的性能。研究表明,该方法在与原始算法相同的CPU使用率下,加密和解密指纹模板的速度更快,但占用的内存更高。因此,它具有在物联网环境中用于安全的潜力。
{"title":"An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment","authors":"N. Katuk, Ikenna Rene Chiadighikaobi","doi":"10.54039/ijcnis.v13i3.5101","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5101","url":null,"abstract":"Many previous studies had proven that The PRESENT algorithm is ultra-lightweight encryption. Therefore, it is suitable for use in an IoT environment. However, the main problem with block encryption algorithms like PRESENT is that it causes attackers to break the encryption key. In the context of a fingerprint template, it contains a header and many zero blocks that lead to a pattern and make it easier for attackers to obtain an encryption key. Thus, this research proposed header and zero blocks bypass method during the block pre-processing to overcome this problem. First, the original PRESENT algorithm was enhanced by incorporating the block pre-processing phase. Then, the algorithm’s performance was tested using three measures: time, memory usage, and CPU usage for encrypting and decrypting fingerprint templates. This study demonstrated that the proposed method encrypted and decrypted the fingerprint templates faster with the same CPU usage of the original algorithm but consumed higher memory. Thus, it has the potential to be used in IoT environments for security.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing 基于雾和云计算的异构智能环境下特征感知DDoS检测
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5080
Wanderson L. Costa, Ariel L. C. Portela, R. Gomes
Nowadays, urban environments are deploying smart environments (SEs) to evolve infrastructures, resources, and services. SEs are composed of a huge amount of heterogeneous devices, i.e., the SEs have both personal devices (smartphones, notebooks, tablets, etc) and Internet of Things (IoT) devices (sensors, actuators, and others). One of the existing problems of the SEs is the detection of Distributed Denial of Service (DDoS) attacks, due to the vulnerabilities of IoT devices. In this way, it is necessary to deploy solutions that can detect DDoS in SEs, dealing with issues like scalability, adaptability, and heterogeneity (distinct protocols, hardware capacity, and running applications). Within this context, this article presents an Intelligent System for DDoS detection in SEs, applying Machine Learning (ML), Fog, and Cloud computing approaches. Additionally, the article presents a study about the most important traffic features for detecting DDoS in SEs, as well as a traffic segmentation approach to improve the accuracy of the system. The experiments performed, using real network traffic, suggest that the proposed system reaches 99% of accuracy, while reduces the volume of data exchanged and the detection time.
如今,城市环境正在部署智能环境(se),以发展基础设施、资源和服务。se由大量异构设备组成,即se既有个人设备(智能手机、笔记本电脑、平板电脑等),也有物联网(IoT)设备(传感器、执行器等)。由于物联网设备的漏洞,se存在的问题之一是无法检测分布式拒绝服务(DDoS)攻击。因此,有必要部署能够在se中检测DDoS的解决方案,处理可伸缩性、适应性和异构性(不同的协议、硬件容量和运行的应用程序)等问题。在此背景下,本文介绍了一种在se中应用机器学习(ML)、雾和云计算方法进行DDoS检测的智能系统。此外,本文还研究了在se中检测DDoS的最重要的流量特征,以及提高系统准确性的流量分割方法。使用真实网络流量进行的实验表明,该系统达到了99%的准确率,同时减少了数据交换量和检测时间。
{"title":"Features-Aware DDoS Detection in Heterogeneous Smart Environments based on Fog and Cloud Computing","authors":"Wanderson L. Costa, Ariel L. C. Portela, R. Gomes","doi":"10.54039/ijcnis.v13i3.5080","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5080","url":null,"abstract":"Nowadays, urban environments are deploying smart environments (SEs) to evolve infrastructures, resources, and services. SEs are composed of a huge amount of heterogeneous devices, i.e., the SEs have both personal devices (smartphones, notebooks, tablets, etc) and Internet of Things (IoT) devices (sensors, actuators, and others). One of the existing problems of the SEs is the detection of Distributed Denial of Service (DDoS) attacks, due to the vulnerabilities of IoT devices. In this way, it is necessary to deploy solutions that can detect DDoS in SEs, dealing with issues like scalability, adaptability, and heterogeneity (distinct protocols, hardware capacity, and running applications). Within this context, this article presents an Intelligent System for DDoS detection in SEs, applying Machine Learning (ML), Fog, and Cloud computing approaches. Additionally, the article presents a study about the most important traffic features for detecting DDoS in SEs, as well as a traffic segmentation approach to improve the accuracy of the system. The experiments performed, using real network traffic, suggest that the proposed system reaches 99% of accuracy, while reduces the volume of data exchanged and the detection time.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131835533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead 开销约束下认知无线电网络协同频谱感知的联盟形成博弈
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5077
Utpala Borgohain, S. Borkotokey, S. Deka
Cooperative spectrum sensing improves the sensing performance of secondary users by exploiting spatial diversity in cognitive radio networks. However, the cooperation of secondary users introduces some overhead also that may degrade the overall performance of cooperative spectrum sensing.  The trade-off between cooperation gain and overhead plays a vital role in modeling cooperative spectrum sensing.  This paper considers overhead in terms of reporting energy and reporting time. We propose a cooperative spectrum sensing based coalitional game model where the utility of the game is formulated as a function of throughput gain and overhead. To achieve a rational average throughput of secondary users, the overhead incurred is to be optimized. This work emphasizes on optimization of the overhead incurred. In cooperative spectrum sensing, the large number of cooperating users improve the detection performance, on the contrary, it increases overhead too. So, to limit the maximum coalition size we propose a formulation under the constraint of the probability of false alarm. An efficient fusion center selection scheme and an algorithm to select eligible secondary users for reporting are proposed to reduce the reporting overhead. We also outline a distributed cooperative spectrum sensing algorithm using the properties of the coalition formation game and prove that the utility of the proposed game has non-transferable properties.  The simulation results show that the proposed schemes reduce the overhead of reporting without compromising the overall detection performance of cooperative spectrum sensing.
协同频谱感知通过利用认知无线电网络中的空间分异来提高二次用户的感知性能。但是,二次用户的协同也会带来一定的开销,这可能会降低协同频谱感知的整体性能。协作增益与开销之间的权衡在协作频谱感知建模中起着至关重要的作用。本文考虑了报告精力和报告时间方面的开销。我们提出了一个基于合作频谱感知的联合博弈模型,其中博弈的效用被表述为吞吐量增益和开销的函数。为了实现次要用户的合理平均吞吐量,需要对产生的开销进行优化。这项工作着重于优化所产生的开销。在协同频谱感知中,大量的合作用户提高了检测性能,但同时也增加了开销。因此,为了限制最大联盟规模,我们提出了一个虚警概率约束下的公式。为了减少报告开销,提出了一种高效的融合中心选择方案和选择符合条件的二级用户进行报告的算法。我们还提出了一种利用联盟形成博弈特性的分布式合作频谱感知算法,并证明了该博弈的效用具有不可转移的特性。仿真结果表明,所提方案在不影响协同频谱感知整体检测性能的前提下,降低了报告开销。
{"title":"A Coalition Formation Game for Cooperative Spectrum Sensing in Cognitive Radio Network under the Constraint of Overhead","authors":"Utpala Borgohain, S. Borkotokey, S. Deka","doi":"10.54039/ijcnis.v13i3.5077","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5077","url":null,"abstract":"Cooperative spectrum sensing improves the sensing performance of secondary users by exploiting spatial diversity in cognitive radio networks. However, the cooperation of secondary users introduces some overhead also that may degrade the overall performance of cooperative spectrum sensing.  The trade-off between cooperation gain and overhead plays a vital role in modeling cooperative spectrum sensing.  This paper considers overhead in terms of reporting energy and reporting time. We propose a cooperative spectrum sensing based coalitional game model where the utility of the game is formulated as a function of throughput gain and overhead. To achieve a rational average throughput of secondary users, the overhead incurred is to be optimized. This work emphasizes on optimization of the overhead incurred. In cooperative spectrum sensing, the large number of cooperating users improve the detection performance, on the contrary, it increases overhead too. So, to limit the maximum coalition size we propose a formulation under the constraint of the probability of false alarm. An efficient fusion center selection scheme and an algorithm to select eligible secondary users for reporting are proposed to reduce the reporting overhead. We also outline a distributed cooperative spectrum sensing algorithm using the properties of the coalition formation game and prove that the utility of the proposed game has non-transferable properties.  The simulation results show that the proposed schemes reduce the overhead of reporting without compromising the overall detection performance of cooperative spectrum sensing.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System 毫米波MIMO系统中新型混合预编码器的设计与开发
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5096
K. Srinivas, Srinivasulu Tadisetty
Power consumption and hardware cost reduction with the use of hybrid beamforming in large-scale millimeter wave MIMO systems. The large dimensional analog precoding integrates with the hybrid beamforming based on the phase shifters including digital precoding with lower dimensionality. The reduction of Euclidean distance between the hybrid precoder and fully digital is the major problem to overcome the minimization of resultant spectral efficiency. The issue formulates as a fully digital precoder’s matrix factorization problem based on the analog RF precoder matrix and the digital baseband precoder matrix. An additional element-wise unit modulus constraint is imposed by the phase shifters on the analog RF precoder matrix. The traditional methods have a problem of performance loss in spectral efficiency. In the processing time and iteration, high complexities result in optimization algorithms. In this paper, a novel low complexity algorithm proposes which maximizes the spectral efficiency and reduces the computational processing time. 
在大规模毫米波MIMO系统中使用混合波束形成可降低功耗和硬件成本。大维模拟预编码与基于移相器的混合波束形成相结合,其中包括低维数字预编码。减小混合预编码器与全数字预编码器之间的欧氏距离是克服最终频谱效率最小化的主要问题。该问题是一个基于模拟射频预编码器矩阵和数字基带预编码器矩阵的全数字预编码器矩阵分解问题。相移器对模拟射频预编码器矩阵施加了额外的单元单元模量约束。传统的方法在频谱效率方面存在性能损失的问题。在处理时间和迭代上,高复杂性导致了优化算法。本文提出了一种新的低复杂度算法,可以最大限度地提高频谱效率,减少计算处理时间。
{"title":"Design and Development of Novel Hybrid Precoder for Millimeter-Wave MIMO System","authors":"K. Srinivas, Srinivasulu Tadisetty","doi":"10.54039/ijcnis.v13i3.5096","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5096","url":null,"abstract":"Power consumption and hardware cost reduction with the use of hybrid beamforming in large-scale millimeter wave MIMO systems. The large dimensional analog precoding integrates with the hybrid beamforming based on the phase shifters including digital precoding with lower dimensionality. The reduction of Euclidean distance between the hybrid precoder and fully digital is the major problem to overcome the minimization of resultant spectral efficiency. The issue formulates as a fully digital precoder’s matrix factorization problem based on the analog RF precoder matrix and the digital baseband precoder matrix. An additional element-wise unit modulus constraint is imposed by the phase shifters on the analog RF precoder matrix. The traditional methods have a problem of performance loss in spectral efficiency. In the processing time and iteration, high complexities result in optimization algorithms. In this paper, a novel low complexity algorithm proposes which maximizes the spectral efficiency and reduces the computational processing time. ","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The method of discretization signals to minimize the fallibility of information recovery 离散化信号的方法,以尽量减少信息恢复的错误
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5070
O. Laptiev, S. Yevseiev, Larysa Hatsenko, O. Daki, Vitaliy Ivanenko, V. Fedunov, S. Hohoniants
The paper proposes a fundamentally new approach to the formulation of the problem of optimizing the discretization interval (frequency). The well-known traditional methods of restoring an analog signal from its discrete implementations consist of sequentially solving two problems: restoring the output signal from a discrete signal at the output of a digital block and restoring the input signal of an analog block from its output signal. However, this approach leads to methodical fallibility caused by interpolation when solving the first problem and by regularizing the equation when solving the second problem. The aim of the work is to develop a method for the signal discretization to minimize the fallibility of information recovery to determine the optimal discretization frequency.The proposed method for determining the optimal discretization rate makes it possible to exclude both components of the methodological fallibility in recovering information about the input signal. This was achieved due to the fact that to solve the reconstruction problem, instead of the known equation, a relation is used that connects the input signal of the analog block with the output discrete signal of the digital block.The proposed relation is devoid of instabilities inherent in the well-known equation. Therefore, when solving it, neither interpolation nor regularization is required, which means that there are no components of the methodological fallibility caused by the indicated operations. In addition, the proposed ratio provides a joint consideration of the properties of the interference in the output signal of the digital block and the frequency properties of the transforming operator, which allows minimizing the fallibility in restoring the input signal of the analog block and determining the optimal discretization frequency.A widespread contradiction in the field of signal information recovery from its discrete values has been investigated. A decrease in the discretization frequency below the optimal one leads to an increase in the approximation fallibility and the loss of some information about the input signal of the analog-to-digital signal processing device. At the same time, unjustified overestimation of the discretization rate, complicating the technical implementation of the device, is not useful, since not only does it not increase the information about the input signal, but, if necessary, its restoration leads to its decrease due to the increase in the effect of noise in the output signal on the recovery accuracy. input signal. The proposed method for signal discretization based on the minimum information recovery fallibility to determine the optimal discretization rate allows us to solve this contradiction.
本文提出了一种全新的离散化区间(频率)优化问题的表述方法。众所周知,从离散实现中恢复模拟信号的传统方法包括依次解决两个问题:从数字块的输出处的离散信号中恢复输出信号,以及从模拟块的输出信号中恢复输入信号。然而,这种方法导致了在解决第一个问题时的插值和在解决第二个问题时的正则化方程所导致的方法上的错误。本文的目的是研究一种信号离散化的方法,使信息恢复的错误最小化,从而确定最佳的离散化频率。所提出的确定最佳离散化率的方法使得在恢复输入信号的信息时可以排除方法错误的两个组成部分。这是由于要解决重建问题,而不是已知的方程,使用连接模拟块的输入信号与数字块的输出离散信号的关系。所提出的关系式没有众所周知的方程式所固有的不稳定性。因此,在求解它时,既不需要插值也不需要正则化,这意味着不存在由指示操作引起的方法错误的组成部分。此外,所提出的比率提供了对数字块输出信号中的干扰特性和变换算子的频率特性的联合考虑,从而可以最大限度地减少恢复模拟块输入信号和确定最佳离散频率的错误。研究了从离散值中恢复信号信息的一个广泛存在的矛盾。如果离散化频率降低到最优频率以下,则会导致近似误差的增加和模数信号处理装置输入信号的一些信息的丢失。同时,不合理的高估离散化率,使设备的技术实现复杂化,是无用的,因为它不仅没有增加关于输入信号的信息,而且,如果必要的话,由于输出信号中噪声对恢复精度的影响增加,其恢复导致其减少。输入信号。提出的基于最小信息恢复误差率确定最优离散率的信号离散化方法解决了这一矛盾。
{"title":"The method of discretization signals to minimize the fallibility of information recovery","authors":"O. Laptiev, S. Yevseiev, Larysa Hatsenko, O. Daki, Vitaliy Ivanenko, V. Fedunov, S. Hohoniants","doi":"10.54039/ijcnis.v13i3.5070","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5070","url":null,"abstract":"The paper proposes a fundamentally new approach to the formulation of the problem of optimizing the discretization interval (frequency). The well-known traditional methods of restoring an analog signal from its discrete implementations consist of sequentially solving two problems: restoring the output signal from a discrete signal at the output of a digital block and restoring the input signal of an analog block from its output signal. However, this approach leads to methodical fallibility caused by interpolation when solving the first problem and by regularizing the equation when solving the second problem. The aim of the work is to develop a method for the signal discretization to minimize the fallibility of information recovery to determine the optimal discretization frequency.The proposed method for determining the optimal discretization rate makes it possible to exclude both components of the methodological fallibility in recovering information about the input signal. This was achieved due to the fact that to solve the reconstruction problem, instead of the known equation, a relation is used that connects the input signal of the analog block with the output discrete signal of the digital block.The proposed relation is devoid of instabilities inherent in the well-known equation. Therefore, when solving it, neither interpolation nor regularization is required, which means that there are no components of the methodological fallibility caused by the indicated operations. In addition, the proposed ratio provides a joint consideration of the properties of the interference in the output signal of the digital block and the frequency properties of the transforming operator, which allows minimizing the fallibility in restoring the input signal of the analog block and determining the optimal discretization frequency.A widespread contradiction in the field of signal information recovery from its discrete values has been investigated. A decrease in the discretization frequency below the optimal one leads to an increase in the approximation fallibility and the loss of some information about the input signal of the analog-to-digital signal processing device. At the same time, unjustified overestimation of the discretization rate, complicating the technical implementation of the device, is not useful, since not only does it not increase the information about the input signal, but, if necessary, its restoration leads to its decrease due to the increase in the effect of noise in the output signal on the recovery accuracy. input signal. The proposed method for signal discretization based on the minimum information recovery fallibility to determine the optimal discretization rate allows us to solve this contradiction.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123457766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved Framework for Biometric Database's privacy 一种改进的生物特征数据库隐私保护框架
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5143
Ahmed El-Yahyaoui, F. Omary
Security and privacy are huge challenges in biometric systems. Biometrics are sensitive data that should be protected from any attacker and especially attackers targeting the confidentiality and integrity of biometric data. In this paper an extensive review of different physiological biometric techniques is provided. A comparative analysis of the various sus mentioned biometrics, including characteristics and properties is conducted. Qualitative and quantitative evaluation of the most relevant physiological biometrics is achieved. Furthermore, we propose a new framework for biometric database privacy. Our approach is based on the use of the promising fully homomorphic encryption technology. As a proof of concept, we establish an initial implementation of our security module using JAVA programming language.
安全和隐私是生物识别系统面临的巨大挑战。生物特征是敏感数据,应该受到保护,不受任何攻击者的攻击,特别是针对生物特征数据的机密性和完整性的攻击者。本文对不同的生理生物识别技术进行了广泛的综述。对所提到的各种生物特征进行了比较分析,包括特征和性能。实现了最相关生理生物特征的定性和定量评价。此外,我们提出了一个新的生物特征数据库隐私框架。我们的方法是基于使用有前途的全同态加密技术。作为概念验证,我们使用JAVA编程语言建立了安全模块的初始实现。
{"title":"An improved Framework for Biometric Database's privacy","authors":"Ahmed El-Yahyaoui, F. Omary","doi":"10.54039/ijcnis.v13i3.5143","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5143","url":null,"abstract":"Security and privacy are huge challenges in biometric systems. Biometrics are sensitive data that should be protected from any attacker and especially attackers targeting the confidentiality and integrity of biometric data. In this paper an extensive review of different physiological biometric techniques is provided. A comparative analysis of the various sus mentioned biometrics, including characteristics and properties is conducted. Qualitative and quantitative evaluation of the most relevant physiological biometrics is achieved. Furthermore, we propose a new framework for biometric database privacy. Our approach is based on the use of the promising fully homomorphic encryption technology. As a proof of concept, we establish an initial implementation of our security module using JAVA programming language.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127237420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam Distribution Model 基于Skellam分布模型提高车载Ad Hoc网络路由生存期
Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5028
M. A.Tawfeeq
The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents  a two-stage algorithm to select a route that can sustain communication between vehicles for as long as possible while taking into account the variables that affect the VANET topology. The first stage uses Skellam distribution model to assess the connectivity probability of paths in ‎a 2d road network based on traffic-flow and the number of vehicles ‎joining and leaving the ‎network,  accordingly, the path with the highest connectivity is chosen. In the second stage, the control packets sent only to vehicles on the selected path to detect routes between source and destination, thus reducing the overhead of control packets and increasing network stability. ‎ the algorithm adopts the principle of global evaluation to ‎estimate the lifetime ‎of the ‎detected ‎routes within the chosen path. ‎the route with the ‎best estimated ‎lifetime ‎is ‎chosen to be ‎the active route. ‎in the event of route failure, the validity of the next route in lifetime is confirmed to be adopted as the alternate route. The proposed algorithm was compared with both on-‎demand distance ‎vector routing protocol (AODV) protocol and the modified location-aided routing ‎‎(LAR) ‎protocol. The proposed algorithm showed greater network stability, higher performance in terms of longer lifetime route detection, less energy consumption and higher throughput.
智能城市的出现和使用智能交通系统的需求导致对车辆自组织网络(VANET)的依赖日益增加。VANET的拓扑结构是高度动态的,因此有效路由时间短。本文提出了一种两阶段算法,在考虑影响VANET拓扑结构的变量的同时,选择一条能够尽可能长时间维持车辆之间通信的路线。第一阶段利用Skellam分布模型,基于交通流量和车辆进出网络的数量,评估二维道路网络中路径的连通概率,从而选择连通度最高的路径;在第二阶段,控制数据包只发送给选定路径上的车辆,用于检测源和目的之间的路由,从而减少控制数据包的开销,提高网络的稳定性。该算法采用全局评估的原则来估计所选路径内被检测到的路由的生存期。具有最佳估计生存期的路由被选为活动路由。在路由失败的情况下,确认下一条路由在生命周期内的有效性作为备选路由。将该算法与按需距离矢量路由协议(AODV)和改进的位置辅助路由协议(LAR)进行了比较。该算法具有更好的网络稳定性、更长的路由检测寿命、更低的能耗和更高的吞吐量。
{"title":"Enhancing Route lifetime in Vehicular Ad Hoc ?Networks Based on Skellam Distribution Model","authors":"M. A.Tawfeeq","doi":"10.54039/ijcnis.v13i3.5028","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5028","url":null,"abstract":"The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents  a two-stage algorithm to select a route that can sustain communication between vehicles for as long as possible while taking into account the variables that affect the VANET topology. The first stage uses Skellam distribution model to assess the connectivity probability of paths in ‎a 2d road network based on traffic-flow and the number of vehicles ‎joining and leaving the ‎network,  accordingly, the path with the highest connectivity is chosen. In the second stage, the control packets sent only to vehicles on the selected path to detect routes between source and destination, thus reducing the overhead of control packets and increasing network stability. ‎ the algorithm adopts the principle of global evaluation to ‎estimate the lifetime ‎of the ‎detected ‎routes within the chosen path. ‎the route with the ‎best estimated ‎lifetime ‎is ‎chosen to be ‎the active route. ‎in the event of route failure, the validity of the next route in lifetime is confirmed to be adopted as the alternate route. The proposed algorithm was compared with both on-‎demand distance ‎vector routing protocol (AODV) protocol and the modified location-aided routing ‎‎(LAR) ‎protocol. The proposed algorithm showed greater network stability, higher performance in terms of longer lifetime route detection, less energy consumption and higher throughput.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Commun. Networks Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1