首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN) 基于Clibat算法的无线传感器网络攻防模型最小误差研究
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217700
K. Abdul Basith, T. Shankar
{"title":"Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN)","authors":"K. Abdul Basith, T. Shankar","doi":"10.22247/ijcna/2022/217700","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217700","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43563715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm 利用机器学习算法分析和批准物联网边缘计算设备的新型信任协商协议
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217704
V. Maruthi Prasad, B. Bharathi
{"title":"A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm","authors":"V. Maruthi Prasad, B. Bharathi","doi":"10.22247/ijcna/2022/217704","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217704","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45024389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks 一种新的基于agent的多路径路由协议以延长集群无线传感器网络的生存期并提高其可靠性
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217702
Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra
– Over the clustered wireless network systems, development in wireless technology has had a more substantial influence. Entities need to communicate with one another in order to create a sustainable ecosystem. Clustering methods help connect and organise the sensor nodes by load balancing and extending the network lifetime. Only now, various techniques have been developed for solving routing problems but have yet to focus on routing reliability with avoidance of data collision in real scenarios. This research is carried out for the reliability of routing by multi-objective optimization in static and dynamic environments through agent-based analysis with avoidance of data collision and depletion of energy. This study introduces a fuzzy-based multipath clustering technique that exhibits both static and dynamic clustering formation properties. The designated region starts the clustering process once the sensor nodes are ready to begin the data transmission procedure. The proposed technique works in two steps: a) fuzzy cluster head selection; and b) multi-objective agent-based multipath routing protocols for shortest route path discovery. The enhancement made in cluster creation and selection is the critical feature. A well-organized sensor ecosystem has lessened the negative impacts of network collision and energy exhaustion. The packet delivery ratio, communication overhead, and energy consumption are the performance metrics examined when simulating the specified protocol using the computer language NS2. The devised fuzzy-based multi-path routing (FC-MRP) clustering technique outperforms the AODV (Ad-hoc on-demand distance vector routing) protocol, according to the results. The average percentage of improvement concerning PDR, Throughput, end-to-end latency, Overhead, Energy utilised, Energy efficiency, Network lifetime, and PLR is found to be +2.53, +2.23, -18.58, -22.46, -17.95, +23.00, +4.11, -18.09 respectively.
–在集群无线网络系统中,无线技术的发展产生了更大的影响。各实体需要相互沟通,以创建可持续的生态系统。集群方法通过负载平衡和延长网络寿命来帮助连接和组织传感器节点。直到现在,已经开发了各种技术来解决路由问题,但尚未将重点放在路由可靠性和避免真实场景中的数据冲突上。本研究通过基于代理的分析,通过静态和动态环境下的多目标优化,在避免数据冲突和能量消耗的情况下,对路由的可靠性进行了研究。该研究介绍了一种基于模糊的多径聚类技术,该技术同时具有静态和动态聚类形成特性。一旦传感器节点准备好开始数据传输过程,指定区域就开始聚类过程。所提出的技术分为两个步骤:a)模糊簇头选择;和b)用于最短路由路径发现的基于多目标代理的多径路由协议。集群创建和选择方面的增强是关键特性。一个组织良好的传感器生态系统减少了网络冲突和能源消耗的负面影响。当使用计算机语言NS2模拟指定协议时,数据包传递率、通信开销和能耗是检查的性能指标。结果表明,所设计的基于模糊的多径路由(FC-MRP)聚类技术优于AODV(Ad-hoc点播距离矢量路由)协议。PDR、吞吐量、端到端延迟、开销、能量利用率、能效、网络寿命和PLR的平均改善百分比分别为+2.53、+2.23、-18.58、-22.46、-17.95、+23.00、+4.11和-18.09。
{"title":"A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks","authors":"Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra","doi":"10.22247/ijcna/2022/217702","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217702","url":null,"abstract":"– Over the clustered wireless network systems, development in wireless technology has had a more substantial influence. Entities need to communicate with one another in order to create a sustainable ecosystem. Clustering methods help connect and organise the sensor nodes by load balancing and extending the network lifetime. Only now, various techniques have been developed for solving routing problems but have yet to focus on routing reliability with avoidance of data collision in real scenarios. This research is carried out for the reliability of routing by multi-objective optimization in static and dynamic environments through agent-based analysis with avoidance of data collision and depletion of energy. This study introduces a fuzzy-based multipath clustering technique that exhibits both static and dynamic clustering formation properties. The designated region starts the clustering process once the sensor nodes are ready to begin the data transmission procedure. The proposed technique works in two steps: a) fuzzy cluster head selection; and b) multi-objective agent-based multipath routing protocols for shortest route path discovery. The enhancement made in cluster creation and selection is the critical feature. A well-organized sensor ecosystem has lessened the negative impacts of network collision and energy exhaustion. The packet delivery ratio, communication overhead, and energy consumption are the performance metrics examined when simulating the specified protocol using the computer language NS2. The devised fuzzy-based multi-path routing (FC-MRP) clustering technique outperforms the AODV (Ad-hoc on-demand distance vector routing) protocol, according to the results. The average percentage of improvement concerning PDR, Throughput, end-to-end latency, Overhead, Energy utilised, Energy efficiency, Network lifetime, and PLR is found to be +2.53, +2.23, -18.58, -22.46, -17.95, +23.00, +4.11, -18.09 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data 基于HADAES (Advanced Encryption Standard)算法的云数据虚拟化环境攻击检测
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215916
R. Mangalagowri, R. Venkataraman
– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).
云计算展示了出色的能力,可以在任何需要的时候通过互联网产生成本效益高、易于管理、灵活且收费的资源。云计算,可以使硬件资源的潜力通过最佳和共享的使用得到极大的提高。云计算概念的发展也带来了安全挑战,考虑到存在资源共享,并且在管理程序的帮助下进行调节,管理程序可能成为恶意来宾虚拟机(VM)和远程入侵者的目标。管理程序本身受到黑客的攻击。由于虚拟化环境受到攻击,虚拟化环境下的虚拟机也会受到攻击。因此,为了防止上述问题,在本研究中,引入了使用高级加密标准(HADAES)算法进行Hypervisor攻击检测的增强型粒子群优化(EPSO),旨在从整体上提高云性能。这项工作包括系统建模、最优资源分配和hypervisor攻击检测等重要阶段。系统模型包括云计算环境下的数据中心模型、迁移请求模型和能源模型。资源分配采用EPSO算法,利用局部和全局最优值选择最优资源。Hypervisor攻击检测采用HADAES算法。它有助于确定虚拟机管理程序和虚拟机攻击者,并致力于为云数据提供更高的安全性。测试结果表明,该算法在提高可靠性、吞吐量、降低能耗、成本复杂度和时间复杂度等方面优于现有算法。IDS的有效性取决于其在防御数量与误报或检测错误数量之间取得平衡的能力。算法。应用EPSO方法计算了种群成员的最佳成本和平均成本以及执行时间。本文提出了一种基于运动模式的时间自适应粒子群算法,称为运动模式自适应粒子群算法(EPSO)。
{"title":"Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data","authors":"R. Mangalagowri, R. Venkataraman","doi":"10.22247/ijcna/2022/215916","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215916","url":null,"abstract":"– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47496294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks 基于信任的移动自组织网络安全与服务质量路由设计
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215913
G. Sripriya, T. Santha
– The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.
–移动自组织网络(MANET)具有高动态性、易受攻击的链路和完全的去中心化,带来了重大的安全问题。MAODV(Multicast Ad-hoc On Demand Distance Vector,多播自组织点播距离矢量)协议是自组织网络中使用的一种关键路由协议,它不符合安全标准,容易受到敌对环境的攻击。有害的节点很容易破坏由众多无线网络组成的移动自组织网络。最困难的任务将是在无线节点之间共享带宽,同时保持路由的服务质量(QoS)。为了识别潜在的有害节点,必须制定基于信任的路由策略。所提出的努力需要构建具有社会信任和QoS信任的安全组合的基于信任的QoS路由。建议设计的第一种方法从消除死节点开始,这会导致数据包收集错误。当采用信任机制进行通信时,这些死节点也可能导致路由分析困难。所建议的方法在基于分组行为特征的转发节点选择方面将表现得更好。将根据几个参数来选择前向节点,包括节点位置之间的剩余能量、节点之间的信道质量和连接质量。使用网络模拟器工具(NS2)对所提出的方法进行了仿真,仿真结果表明,该方法在定期识别和分离有问题的节点方面是准确有效的。
{"title":"A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks","authors":"G. Sripriya, T. Santha","doi":"10.22247/ijcna/2022/215913","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215913","url":null,"abstract":"– The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44729969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems 使用入侵检测系统的物联网网络安全框架的调查和测试
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215920
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara
– The Internet of Things is a new paradigm that facilitates collecting business or personal data through smart devices with Internet connections. IoT devices are heterogeneous and have a limited computational capacity which represents a challenge for protecting data against cyber-attacks. This article surveys communication protocols, cybersecurity attacks and intrusion detection systems (IDSs). This study identifies the IoT protocols used for data transmission, and cybersecurity challenges and then presents a comparative analysis of IDSs. Next, the IoT cybersecurity framework, IoTCyFra, is surveyed by cybersecurity specialists. IoTCyFra is a validated IoT cybersecurity framework with an organizational structure that safeguards data and detects cybersecurity threats in an IoT infrastructure. It also explores how an IDS protects against cyberattacks through an IoT-controlled environment. Finally, the results and conclusions are reported.
–物联网是一种新的模式,有助于通过具有互联网连接的智能设备收集商业或个人数据。物联网设备是异构的,计算能力有限,这对保护数据免受网络攻击构成了挑战。本文综述了通信协议、网络安全攻击和入侵检测系统(IDS)。本研究确定了用于数据传输的物联网协议和网络安全挑战,然后对IDS进行了比较分析。接下来,物联网网络安全框架IoTCyFra将由网络安全专家进行调查。IoTCyFra是一个经过验证的物联网网络安全框架,其组织结构可保护数据并检测物联网基础设施中的网络安全威胁。它还探讨了IDS如何通过物联网控制的环境来抵御网络攻击。最后,报告了研究结果和结论。
{"title":"Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems","authors":"Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara","doi":"10.22247/ijcna/2022/215920","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215920","url":null,"abstract":"– The Internet of Things is a new paradigm that facilitates collecting business or personal data through smart devices with Internet connections. IoT devices are heterogeneous and have a limited computational capacity which represents a challenge for protecting data against cyber-attacks. This article surveys communication protocols, cybersecurity attacks and intrusion detection systems (IDSs). This study identifies the IoT protocols used for data transmission, and cybersecurity challenges and then presents a comparative analysis of IDSs. Next, the IoT cybersecurity framework, IoTCyFra, is surveyed by cybersecurity specialists. IoTCyFra is a validated IoT cybersecurity framework with an organizational structure that safeguards data and detects cybersecurity threats in an IoT infrastructure. It also explores how an IDS protects against cyberattacks through an IoT-controlled environment. Finally, the results and conclusions are reported.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46543574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network 基于Deft粒子群优化的移动Ad Hoc网络能耗最小化路由协议(DPSORP)
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215922
S. Preema, M. Thilagu
– Rapid technological development in the wireless communication sector has improved mobile ad hoc networks (MANETs) to serve a variety of domains, such as military activities, emergency operations, civilian settings, and disaster management. Self-organizing mobile nodes in MANET work together to create a dynamic network architecture to make connections. Before reaching its destination node in a MANET, data must pass through several intermediate nodes. For the creation and maintenance of routes, local link connection is crucial. This paper proposes the Deft Particle Swarm Optimization-based Routing Protocol (DPSORP) to reduce delay, which minimizes energy consumption. DPSORP gives precedence for local and global optimal routes. Before using a route for data transmission, DPSORP assesses its quality using two distinct kinds of rules. DPSORP uses a multi-path for data transmission rather than relying on a single path. Using the NS3 simulator and common network performance metrics and parameters, DPSORP is evaluated. The findings demonstrate unequivocally that the proposed routing protocol, DPSORP, outperforms existing routing protocols in terms of reducing delay and energy consumption .
–无线通信领域的快速技术发展改善了移动自组织网络(MANET),可服务于军事活动、应急行动、民用环境和灾害管理等多个领域。MANET中的自组织移动节点协同工作,创建一个动态的网络架构来建立连接。在到达MANET中的目标节点之前,数据必须经过几个中间节点。对于路由的创建和维护,本地链路连接至关重要。本文提出了一种基于Deft粒子群优化的路由协议(DPSORP)来减少延迟,从而最大限度地减少能耗。DPSORP优先考虑局部和全局最优路由。在使用路由进行数据传输之前,DPSORP使用两种不同的规则来评估其质量。DPSORP使用多路径进行数据传输,而不是依赖于单个路径。使用NS3模拟器和常见的网络性能指标和参数,对DPSORP进行了评估。研究结果明确表明,所提出的路由协议DPSORP在减少延迟和能耗方面优于现有的路由协议。
{"title":"Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network","authors":"S. Preema, M. Thilagu","doi":"10.22247/ijcna/2022/215922","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215922","url":null,"abstract":"– Rapid technological development in the wireless communication sector has improved mobile ad hoc networks (MANETs) to serve a variety of domains, such as military activities, emergency operations, civilian settings, and disaster management. Self-organizing mobile nodes in MANET work together to create a dynamic network architecture to make connections. Before reaching its destination node in a MANET, data must pass through several intermediate nodes. For the creation and maintenance of routes, local link connection is crucial. This paper proposes the Deft Particle Swarm Optimization-based Routing Protocol (DPSORP) to reduce delay, which minimizes energy consumption. DPSORP gives precedence for local and global optimal routes. Before using a route for data transmission, DPSORP assesses its quality using two distinct kinds of rules. DPSORP uses a multi-path for data transmission rather than relying on a single path. Using the NS3 simulator and common network performance metrics and parameters, DPSORP is evaluated. The findings demonstrate unequivocally that the proposed routing protocol, DPSORP, outperforms existing routing protocols in terms of reducing delay and energy consumption .","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43560344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments QSIH:一种新的基于QoS感知的侧链物联网设计,用于安全的医疗部署
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215921
Pooja Mishra, Sandeep Malik
– Internet of Medical Things (IoMT) are networks which are targeted towards design of healthcare communication interfaces with low latency and high security. In order to design such interfaces, efficient models for data encryption, hashing, privacy, and quality of service (QoS) awareness are needed. A wide variety of standard medical interfaces are proposed by researchers, which assist in reducing network redundancies for high-throughput and low latency communications. These interfaces also implement security models that ensure data encryption & privacy. But due to incorporation of encryption methods, QoS performance of the IoMT devices reduces, which limits their real-time usability for in-patient monitoring & treatment. In order to improve IoMT QoS while maintaining high security, this text proposes design of QSIH, which is a QoS-aware sidechain model that can be used for securing IoMT networks. The proposed model describes design of a blockchain-based data storage & communication interface, which is capable of removing a wide variety of network attacks. The delay needed for communication in any blockchain-based interface increases exponentially w.r.t. number of blocks added to the system. In order to reduce this delay, a novel machine learning model based on Genetic Algorithm optimization is proposed. The proposed model splits the main blockchain into multiple shards in a QoS-aware manner, thereby ensuring low delay, and high communication throughput. The shards (or sidechains) are managed using an interactive Q-Learning (IQL), which is able to expand or contract these chains depending upon network’s QoS performance. Sidechains which are unused for large periods of time are combined together, and archived for future reference. The archived sidechains are formed from main blockchain, and are merged with other sidechains depending upon archival requirements of the network. Due to such a dynamic side chaining model, the proposed QSIH model is capable of reducing network communication delay by 18%, increase throughput by 14%, reduce storage cost by 5%, while maintaining high level of security & privacy in the network. The model was tested under different IoMT scenarios, and it was observed that it showcased consistent performance across different network emulations.
-医疗物联网(IoMT)是针对低延迟和高安全性的医疗保健通信接口设计的网络。为了设计这样的接口,需要有效的数据加密、散列、隐私和服务质量(QoS)感知模型。研究人员提出了各种各样的标准医疗接口,这些接口有助于减少高吞吐量和低延迟通信的网络冗余。这些接口还实现了确保数据加密和隐私的安全模型。但由于采用了加密方法,IoMT设备的QoS性能降低,限制了其对住院患者监测和治疗的实时可用性。为了在保证高安全性的同时提高IoMT的QoS,本文提出了一种基于QoS感知的侧链模型QSIH的设计,该模型可用于IoMT网络的安全保护。所提出的模型描述了基于区块链的数据存储和通信接口的设计,该接口能够消除各种网络攻击。在任何基于区块链的接口中,通信所需的延迟都是以指数方式增加的。为了减少这种延迟,提出了一种基于遗传算法优化的机器学习模型。该模型以qos感知的方式将主区块链划分为多个分片,从而保证了低延迟和高通信吞吐量。分片(或侧链)使用交互式Q-Learning (IQL)进行管理,它能够根据网络的QoS性能扩展或收缩这些链。长时间未使用的侧链被合并在一起,并存档以备将来参考。归档侧链由主区块链组成,并根据网络的归档需求与其他侧链合并。由于这种动态侧链模型,所提出的QSIH模型能够将网络通信延迟降低18%,吞吐量提高14%,存储成本降低5%,同时保持网络的高度安全性和隐私性。该模型在不同的IoMT场景下进行了测试,并观察到它在不同的网络模拟中显示出一致的性能。
{"title":"QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments","authors":"Pooja Mishra, Sandeep Malik","doi":"10.22247/ijcna/2022/215921","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215921","url":null,"abstract":"– Internet of Medical Things (IoMT) are networks which are targeted towards design of healthcare communication interfaces with low latency and high security. In order to design such interfaces, efficient models for data encryption, hashing, privacy, and quality of service (QoS) awareness are needed. A wide variety of standard medical interfaces are proposed by researchers, which assist in reducing network redundancies for high-throughput and low latency communications. These interfaces also implement security models that ensure data encryption & privacy. But due to incorporation of encryption methods, QoS performance of the IoMT devices reduces, which limits their real-time usability for in-patient monitoring & treatment. In order to improve IoMT QoS while maintaining high security, this text proposes design of QSIH, which is a QoS-aware sidechain model that can be used for securing IoMT networks. The proposed model describes design of a blockchain-based data storage & communication interface, which is capable of removing a wide variety of network attacks. The delay needed for communication in any blockchain-based interface increases exponentially w.r.t. number of blocks added to the system. In order to reduce this delay, a novel machine learning model based on Genetic Algorithm optimization is proposed. The proposed model splits the main blockchain into multiple shards in a QoS-aware manner, thereby ensuring low delay, and high communication throughput. The shards (or sidechains) are managed using an interactive Q-Learning (IQL), which is able to expand or contract these chains depending upon network’s QoS performance. Sidechains which are unused for large periods of time are combined together, and archived for future reference. The archived sidechains are formed from main blockchain, and are merged with other sidechains depending upon archival requirements of the network. Due to such a dynamic side chaining model, the proposed QSIH model is capable of reducing network communication delay by 18%, increase throughput by 14%, reduce storage cost by 5%, while maintaining high level of security & privacy in the network. The model was tested under different IoMT scenarios, and it was observed that it showcased consistent performance across different network emulations.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48831772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) 面向低功耗有损网络(RPL)的自适应路由协议,实现水下物联网(IoUT)的可靠节能通信
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215918
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.
-水下物联网(IoUT)正在成为探索水下事物的强大技术。与水面通信相比,水下物体之间的可靠通信是一个重大挑战,特别是水下环境所带来的独特特性,如水流、嘈杂场景和有限的资源。已经提出了几种路由协议来克服IoUT中的挑战。以往的工作主要集中在提高路由过程的可靠性或能效方面。同时关注这两个参数会使路由过程过于复杂,开销很大。布线技术在解决IoUT环境中的噪声和水流问题方面面临挑战。本文通过增强RPL的目标函数(of)来解决水下环境下的路由问题,充分利用了低功耗损耗网络路由协议(RPL)在IoUT通信中的潜力。本文提出的水下自适应RPL (UA-RPL)通过扩展DIO消息特征,将低效率的DODAG构造转变为噪声环境下的高效DODAG构造。许多相邻节点接收扩展的DIO消息,并根据多个路由指标(如跳数、ETX和能量因子)决定适合安全区域的节点。整个网络流量通过多个具有最佳rank值的父节点进行分区,并在水下事物上实现能量均衡路由。它有助于在不影响通信可靠性的情况下提高网络的生存期。对所提出的工作进行了评估,以显示其在水下环境中的优势。仿真结果表明,UA-RPL在15 ~ 60倍频的水下环境下具有良好的性能。此外,它在IoUT环境下优于现有方案。
{"title":"Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT)","authors":"R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran","doi":"10.22247/ijcna/2022/215918","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215918","url":null,"abstract":"– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41580410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency 基于爬山马鹿算法的车辆自组织网络优化路径选择提高能源效率
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215915
K. Giridhar, C. Anbuananth, N. Krishnaraj
– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.
在许多实时应用中,人们发现一种有效的技术可以提高道路的安全性,这种技术被称为车辆自组织网络,简称VANET。尽管VANET有许多优点,但该网络最困难的方面之一仍然是创建有效的路由协议。VANET在其路由过程中涉及到动态因素,这使得它很难成功完成。为了有效地利用现有的网络资源,提高路由的有效性,可以建立多种路由选择策略。为了在VANET中实现更高水平的资源利用率,开发有效的路由协议是绝对必要的。基于这种动力,本研究的目的是提出一种高效的基于马鹿的爬坡算法,称为EEHC-RDA,用于VANET的最优路线选择技术。为了提高系统的使用寿命和能源效率,EEHC-RDA技术优先选择通往最终目的地的最有效路线。此外,EEHC-RDA方法结合了马鹿的交配行为和爬山思想,提高了收敛速度。除此之外,EEHC-RDA方法还计算了一个适应度函数,用于选择考虑各种输入因素的最佳可能路径。为了证明EEHC-RDA方法提供了更高水平的性能,进行了广泛的仿真。这些模拟结果表明,与现有方法相比,所建议的模型在各种不同的指标方面具有增强的性能,这表明目前的方法状态不是最优的。
{"title":"Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency","authors":"K. Giridhar, C. Anbuananth, N. Krishnaraj","doi":"10.22247/ijcna/2022/215915","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215915","url":null,"abstract":"– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48580871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1