首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN) 基于Clibat算法的无线传感器网络攻防模型最小误差研究
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217700
K. Abdul Basith, T. Shankar
{"title":"Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN)","authors":"K. Abdul Basith, T. Shankar","doi":"10.22247/ijcna/2022/217700","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217700","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43563715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm 利用机器学习算法分析和批准物联网边缘计算设备的新型信任协商协议
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217704
V. Maruthi Prasad, B. Bharathi
{"title":"A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm","authors":"V. Maruthi Prasad, B. Bharathi","doi":"10.22247/ijcna/2022/217704","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217704","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45024389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks 一种新的基于agent的多路径路由协议以延长集群无线传感器网络的生存期并提高其可靠性
Q4 Computer Science Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217702
Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra
– Over the clustered wireless network systems, development in wireless technology has had a more substantial influence. Entities need to communicate with one another in order to create a sustainable ecosystem. Clustering methods help connect and organise the sensor nodes by load balancing and extending the network lifetime. Only now, various techniques have been developed for solving routing problems but have yet to focus on routing reliability with avoidance of data collision in real scenarios. This research is carried out for the reliability of routing by multi-objective optimization in static and dynamic environments through agent-based analysis with avoidance of data collision and depletion of energy. This study introduces a fuzzy-based multipath clustering technique that exhibits both static and dynamic clustering formation properties. The designated region starts the clustering process once the sensor nodes are ready to begin the data transmission procedure. The proposed technique works in two steps: a) fuzzy cluster head selection; and b) multi-objective agent-based multipath routing protocols for shortest route path discovery. The enhancement made in cluster creation and selection is the critical feature. A well-organized sensor ecosystem has lessened the negative impacts of network collision and energy exhaustion. The packet delivery ratio, communication overhead, and energy consumption are the performance metrics examined when simulating the specified protocol using the computer language NS2. The devised fuzzy-based multi-path routing (FC-MRP) clustering technique outperforms the AODV (Ad-hoc on-demand distance vector routing) protocol, according to the results. The average percentage of improvement concerning PDR, Throughput, end-to-end latency, Overhead, Energy utilised, Energy efficiency, Network lifetime, and PLR is found to be +2.53, +2.23, -18.58, -22.46, -17.95, +23.00, +4.11, -18.09 respectively.
–在集群无线网络系统中,无线技术的发展产生了更大的影响。各实体需要相互沟通,以创建可持续的生态系统。集群方法通过负载平衡和延长网络寿命来帮助连接和组织传感器节点。直到现在,已经开发了各种技术来解决路由问题,但尚未将重点放在路由可靠性和避免真实场景中的数据冲突上。本研究通过基于代理的分析,通过静态和动态环境下的多目标优化,在避免数据冲突和能量消耗的情况下,对路由的可靠性进行了研究。该研究介绍了一种基于模糊的多径聚类技术,该技术同时具有静态和动态聚类形成特性。一旦传感器节点准备好开始数据传输过程,指定区域就开始聚类过程。所提出的技术分为两个步骤:a)模糊簇头选择;和b)用于最短路由路径发现的基于多目标代理的多径路由协议。集群创建和选择方面的增强是关键特性。一个组织良好的传感器生态系统减少了网络冲突和能源消耗的负面影响。当使用计算机语言NS2模拟指定协议时,数据包传递率、通信开销和能耗是检查的性能指标。结果表明,所设计的基于模糊的多径路由(FC-MRP)聚类技术优于AODV(Ad-hoc点播距离矢量路由)协议。PDR、吞吐量、端到端延迟、开销、能量利用率、能效、网络寿命和PLR的平均改善百分比分别为+2.53、+2.23、-18.58、-22.46、-17.95、+23.00、+4.11和-18.09。
{"title":"A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks","authors":"Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra","doi":"10.22247/ijcna/2022/217702","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217702","url":null,"abstract":"– Over the clustered wireless network systems, development in wireless technology has had a more substantial influence. Entities need to communicate with one another in order to create a sustainable ecosystem. Clustering methods help connect and organise the sensor nodes by load balancing and extending the network lifetime. Only now, various techniques have been developed for solving routing problems but have yet to focus on routing reliability with avoidance of data collision in real scenarios. This research is carried out for the reliability of routing by multi-objective optimization in static and dynamic environments through agent-based analysis with avoidance of data collision and depletion of energy. This study introduces a fuzzy-based multipath clustering technique that exhibits both static and dynamic clustering formation properties. The designated region starts the clustering process once the sensor nodes are ready to begin the data transmission procedure. The proposed technique works in two steps: a) fuzzy cluster head selection; and b) multi-objective agent-based multipath routing protocols for shortest route path discovery. The enhancement made in cluster creation and selection is the critical feature. A well-organized sensor ecosystem has lessened the negative impacts of network collision and energy exhaustion. The packet delivery ratio, communication overhead, and energy consumption are the performance metrics examined when simulating the specified protocol using the computer language NS2. The devised fuzzy-based multi-path routing (FC-MRP) clustering technique outperforms the AODV (Ad-hoc on-demand distance vector routing) protocol, according to the results. The average percentage of improvement concerning PDR, Throughput, end-to-end latency, Overhead, Energy utilised, Energy efficiency, Network lifetime, and PLR is found to be +2.53, +2.23, -18.58, -22.46, -17.95, +23.00, +4.11, -18.09 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data 基于HADAES (Advanced Encryption Standard)算法的云数据虚拟化环境攻击检测
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215916
R. Mangalagowri, R. Venkataraman
– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).
云计算展示了出色的能力,可以在任何需要的时候通过互联网产生成本效益高、易于管理、灵活且收费的资源。云计算,可以使硬件资源的潜力通过最佳和共享的使用得到极大的提高。云计算概念的发展也带来了安全挑战,考虑到存在资源共享,并且在管理程序的帮助下进行调节,管理程序可能成为恶意来宾虚拟机(VM)和远程入侵者的目标。管理程序本身受到黑客的攻击。由于虚拟化环境受到攻击,虚拟化环境下的虚拟机也会受到攻击。因此,为了防止上述问题,在本研究中,引入了使用高级加密标准(HADAES)算法进行Hypervisor攻击检测的增强型粒子群优化(EPSO),旨在从整体上提高云性能。这项工作包括系统建模、最优资源分配和hypervisor攻击检测等重要阶段。系统模型包括云计算环境下的数据中心模型、迁移请求模型和能源模型。资源分配采用EPSO算法,利用局部和全局最优值选择最优资源。Hypervisor攻击检测采用HADAES算法。它有助于确定虚拟机管理程序和虚拟机攻击者,并致力于为云数据提供更高的安全性。测试结果表明,该算法在提高可靠性、吞吐量、降低能耗、成本复杂度和时间复杂度等方面优于现有算法。IDS的有效性取决于其在防御数量与误报或检测错误数量之间取得平衡的能力。算法。应用EPSO方法计算了种群成员的最佳成本和平均成本以及执行时间。本文提出了一种基于运动模式的时间自适应粒子群算法,称为运动模式自适应粒子群算法(EPSO)。
{"title":"Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data","authors":"R. Mangalagowri, R. Venkataraman","doi":"10.22247/ijcna/2022/215916","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215916","url":null,"abstract":"– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47496294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network 基于Deft粒子群优化的移动Ad Hoc网络能耗最小化路由协议(DPSORP)
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215922
S. Preema, M. Thilagu
– Rapid technological development in the wireless communication sector has improved mobile ad hoc networks (MANETs) to serve a variety of domains, such as military activities, emergency operations, civilian settings, and disaster management. Self-organizing mobile nodes in MANET work together to create a dynamic network architecture to make connections. Before reaching its destination node in a MANET, data must pass through several intermediate nodes. For the creation and maintenance of routes, local link connection is crucial. This paper proposes the Deft Particle Swarm Optimization-based Routing Protocol (DPSORP) to reduce delay, which minimizes energy consumption. DPSORP gives precedence for local and global optimal routes. Before using a route for data transmission, DPSORP assesses its quality using two distinct kinds of rules. DPSORP uses a multi-path for data transmission rather than relying on a single path. Using the NS3 simulator and common network performance metrics and parameters, DPSORP is evaluated. The findings demonstrate unequivocally that the proposed routing protocol, DPSORP, outperforms existing routing protocols in terms of reducing delay and energy consumption .
–无线通信领域的快速技术发展改善了移动自组织网络(MANET),可服务于军事活动、应急行动、民用环境和灾害管理等多个领域。MANET中的自组织移动节点协同工作,创建一个动态的网络架构来建立连接。在到达MANET中的目标节点之前,数据必须经过几个中间节点。对于路由的创建和维护,本地链路连接至关重要。本文提出了一种基于Deft粒子群优化的路由协议(DPSORP)来减少延迟,从而最大限度地减少能耗。DPSORP优先考虑局部和全局最优路由。在使用路由进行数据传输之前,DPSORP使用两种不同的规则来评估其质量。DPSORP使用多路径进行数据传输,而不是依赖于单个路径。使用NS3模拟器和常见的网络性能指标和参数,对DPSORP进行了评估。研究结果明确表明,所提出的路由协议DPSORP在减少延迟和能耗方面优于现有的路由协议。
{"title":"Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network","authors":"S. Preema, M. Thilagu","doi":"10.22247/ijcna/2022/215922","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215922","url":null,"abstract":"– Rapid technological development in the wireless communication sector has improved mobile ad hoc networks (MANETs) to serve a variety of domains, such as military activities, emergency operations, civilian settings, and disaster management. Self-organizing mobile nodes in MANET work together to create a dynamic network architecture to make connections. Before reaching its destination node in a MANET, data must pass through several intermediate nodes. For the creation and maintenance of routes, local link connection is crucial. This paper proposes the Deft Particle Swarm Optimization-based Routing Protocol (DPSORP) to reduce delay, which minimizes energy consumption. DPSORP gives precedence for local and global optimal routes. Before using a route for data transmission, DPSORP assesses its quality using two distinct kinds of rules. DPSORP uses a multi-path for data transmission rather than relying on a single path. Using the NS3 simulator and common network performance metrics and parameters, DPSORP is evaluated. The findings demonstrate unequivocally that the proposed routing protocol, DPSORP, outperforms existing routing protocols in terms of reducing delay and energy consumption .","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43560344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks 基于信任的移动自组织网络安全与服务质量路由设计
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215913
G. Sripriya, T. Santha
– The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.
–移动自组织网络(MANET)具有高动态性、易受攻击的链路和完全的去中心化,带来了重大的安全问题。MAODV(Multicast Ad-hoc On Demand Distance Vector,多播自组织点播距离矢量)协议是自组织网络中使用的一种关键路由协议,它不符合安全标准,容易受到敌对环境的攻击。有害的节点很容易破坏由众多无线网络组成的移动自组织网络。最困难的任务将是在无线节点之间共享带宽,同时保持路由的服务质量(QoS)。为了识别潜在的有害节点,必须制定基于信任的路由策略。所提出的努力需要构建具有社会信任和QoS信任的安全组合的基于信任的QoS路由。建议设计的第一种方法从消除死节点开始,这会导致数据包收集错误。当采用信任机制进行通信时,这些死节点也可能导致路由分析困难。所建议的方法在基于分组行为特征的转发节点选择方面将表现得更好。将根据几个参数来选择前向节点,包括节点位置之间的剩余能量、节点之间的信道质量和连接质量。使用网络模拟器工具(NS2)对所提出的方法进行了仿真,仿真结果表明,该方法在定期识别和分离有问题的节点方面是准确有效的。
{"title":"A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks","authors":"G. Sripriya, T. Santha","doi":"10.22247/ijcna/2022/215913","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215913","url":null,"abstract":"– The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44729969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems 使用入侵检测系统的物联网网络安全框架的调查和测试
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215920
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara
– The Internet of Things is a new paradigm that facilitates collecting business or personal data through smart devices with Internet connections. IoT devices are heterogeneous and have a limited computational capacity which represents a challenge for protecting data against cyber-attacks. This article surveys communication protocols, cybersecurity attacks and intrusion detection systems (IDSs). This study identifies the IoT protocols used for data transmission, and cybersecurity challenges and then presents a comparative analysis of IDSs. Next, the IoT cybersecurity framework, IoTCyFra, is surveyed by cybersecurity specialists. IoTCyFra is a validated IoT cybersecurity framework with an organizational structure that safeguards data and detects cybersecurity threats in an IoT infrastructure. It also explores how an IDS protects against cyberattacks through an IoT-controlled environment. Finally, the results and conclusions are reported.
–物联网是一种新的模式,有助于通过具有互联网连接的智能设备收集商业或个人数据。物联网设备是异构的,计算能力有限,这对保护数据免受网络攻击构成了挑战。本文综述了通信协议、网络安全攻击和入侵检测系统(IDS)。本研究确定了用于数据传输的物联网协议和网络安全挑战,然后对IDS进行了比较分析。接下来,物联网网络安全框架IoTCyFra将由网络安全专家进行调查。IoTCyFra是一个经过验证的物联网网络安全框架,其组织结构可保护数据并检测物联网基础设施中的网络安全威胁。它还探讨了IDS如何通过物联网控制的环境来抵御网络攻击。最后,报告了研究结果和结论。
{"title":"Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems","authors":"Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara","doi":"10.22247/ijcna/2022/215920","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215920","url":null,"abstract":"– The Internet of Things is a new paradigm that facilitates collecting business or personal data through smart devices with Internet connections. IoT devices are heterogeneous and have a limited computational capacity which represents a challenge for protecting data against cyber-attacks. This article surveys communication protocols, cybersecurity attacks and intrusion detection systems (IDSs). This study identifies the IoT protocols used for data transmission, and cybersecurity challenges and then presents a comparative analysis of IDSs. Next, the IoT cybersecurity framework, IoTCyFra, is surveyed by cybersecurity specialists. IoTCyFra is a validated IoT cybersecurity framework with an organizational structure that safeguards data and detects cybersecurity threats in an IoT infrastructure. It also explores how an IDS protects against cyberattacks through an IoT-controlled environment. Finally, the results and conclusions are reported.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46543574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments QSIH:一种新的基于QoS感知的侧链物联网设计,用于安全的医疗部署
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215921
Pooja Mishra, Sandeep Malik
– Internet of Medical Things (IoMT) are networks which are targeted towards design of healthcare communication interfaces with low latency and high security. In order to design such interfaces, efficient models for data encryption, hashing, privacy, and quality of service (QoS) awareness are needed. A wide variety of standard medical interfaces are proposed by researchers, which assist in reducing network redundancies for high-throughput and low latency communications. These interfaces also implement security models that ensure data encryption & privacy. But due to incorporation of encryption methods, QoS performance of the IoMT devices reduces, which limits their real-time usability for in-patient monitoring & treatment. In order to improve IoMT QoS while maintaining high security, this text proposes design of QSIH, which is a QoS-aware sidechain model that can be used for securing IoMT networks. The proposed model describes design of a blockchain-based data storage & communication interface, which is capable of removing a wide variety of network attacks. The delay needed for communication in any blockchain-based interface increases exponentially w.r.t. number of blocks added to the system. In order to reduce this delay, a novel machine learning model based on Genetic Algorithm optimization is proposed. The proposed model splits the main blockchain into multiple shards in a QoS-aware manner, thereby ensuring low delay, and high communication throughput. The shards (or sidechains) are managed using an interactive Q-Learning (IQL), which is able to expand or contract these chains depending upon network’s QoS performance. Sidechains which are unused for large periods of time are combined together, and archived for future reference. The archived sidechains are formed from main blockchain, and are merged with other sidechains depending upon archival requirements of the network. Due to such a dynamic side chaining model, the proposed QSIH model is capable of reducing network communication delay by 18%, increase throughput by 14%, reduce storage cost by 5%, while maintaining high level of security & privacy in the network. The model was tested under different IoMT scenarios, and it was observed that it showcased consistent performance across different network emulations.
-医疗物联网(IoMT)是针对低延迟和高安全性的医疗保健通信接口设计的网络。为了设计这样的接口,需要有效的数据加密、散列、隐私和服务质量(QoS)感知模型。研究人员提出了各种各样的标准医疗接口,这些接口有助于减少高吞吐量和低延迟通信的网络冗余。这些接口还实现了确保数据加密和隐私的安全模型。但由于采用了加密方法,IoMT设备的QoS性能降低,限制了其对住院患者监测和治疗的实时可用性。为了在保证高安全性的同时提高IoMT的QoS,本文提出了一种基于QoS感知的侧链模型QSIH的设计,该模型可用于IoMT网络的安全保护。所提出的模型描述了基于区块链的数据存储和通信接口的设计,该接口能够消除各种网络攻击。在任何基于区块链的接口中,通信所需的延迟都是以指数方式增加的。为了减少这种延迟,提出了一种基于遗传算法优化的机器学习模型。该模型以qos感知的方式将主区块链划分为多个分片,从而保证了低延迟和高通信吞吐量。分片(或侧链)使用交互式Q-Learning (IQL)进行管理,它能够根据网络的QoS性能扩展或收缩这些链。长时间未使用的侧链被合并在一起,并存档以备将来参考。归档侧链由主区块链组成,并根据网络的归档需求与其他侧链合并。由于这种动态侧链模型,所提出的QSIH模型能够将网络通信延迟降低18%,吞吐量提高14%,存储成本降低5%,同时保持网络的高度安全性和隐私性。该模型在不同的IoMT场景下进行了测试,并观察到它在不同的网络模拟中显示出一致的性能。
{"title":"QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments","authors":"Pooja Mishra, Sandeep Malik","doi":"10.22247/ijcna/2022/215921","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215921","url":null,"abstract":"– Internet of Medical Things (IoMT) are networks which are targeted towards design of healthcare communication interfaces with low latency and high security. In order to design such interfaces, efficient models for data encryption, hashing, privacy, and quality of service (QoS) awareness are needed. A wide variety of standard medical interfaces are proposed by researchers, which assist in reducing network redundancies for high-throughput and low latency communications. These interfaces also implement security models that ensure data encryption & privacy. But due to incorporation of encryption methods, QoS performance of the IoMT devices reduces, which limits their real-time usability for in-patient monitoring & treatment. In order to improve IoMT QoS while maintaining high security, this text proposes design of QSIH, which is a QoS-aware sidechain model that can be used for securing IoMT networks. The proposed model describes design of a blockchain-based data storage & communication interface, which is capable of removing a wide variety of network attacks. The delay needed for communication in any blockchain-based interface increases exponentially w.r.t. number of blocks added to the system. In order to reduce this delay, a novel machine learning model based on Genetic Algorithm optimization is proposed. The proposed model splits the main blockchain into multiple shards in a QoS-aware manner, thereby ensuring low delay, and high communication throughput. The shards (or sidechains) are managed using an interactive Q-Learning (IQL), which is able to expand or contract these chains depending upon network’s QoS performance. Sidechains which are unused for large periods of time are combined together, and archived for future reference. The archived sidechains are formed from main blockchain, and are merged with other sidechains depending upon archival requirements of the network. Due to such a dynamic side chaining model, the proposed QSIH model is capable of reducing network communication delay by 18%, increase throughput by 14%, reduce storage cost by 5%, while maintaining high level of security & privacy in the network. The model was tested under different IoMT scenarios, and it was observed that it showcased consistent performance across different network emulations.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48831772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks 6G网络中基于深度人工学习的高效设备间数据传输
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215917
V. Sridhar, S. Roslin
– The rising wireless service constraints and user compactness have to lead the progress of 6G communication in the modern days. The benefit of 6G over the presented technologies is a huge support for mixed applications and mobility maintenance. Device to Device (D2D) data transmission in 6G has great attention since it gives a better data delivery rate (DDR). Recently, several methods were established for D2D data transmission. However, energy consumption was not considered to improve the network throughput. To handle such problems, an artificial intelligence technique called Deep Neural Regressive Tangent Transfer Classifier (DNRTTC) model is introduced in this research for D2D data transmission in a 6G system. The designed method includes several layers to attain energy-efficient D2D data transmission. The primary layer is the input layer and it includes several mobile nodes as input. Nodes are transmitted to the hidden layer one. For each node, energy, received signal strength, and connection speed of each mobile node is calculated. Then the similarity analysis is done in the following layer where each node is analyzed with its threshold value. The result is sent to the output layer where the better resource mobile nodes are identified by using the activation function. This leads to attaining energy-efficient D2D data transmission in 6G. Results illustrate that the DNRTTC outperformed compared to conventional methods with better energy efficiency, packet delivery ratio, throughput.
-不断增加的无线服务限制和用户紧凑性必须引领现代6G通信的发展。6G相对于现有技术的优势是对混合应用程序和移动性维护的巨大支持。6G中的设备到设备(D2D)数据传输备受关注,因为它提供了更好的数据传输速率(DDR)。近年来,建立了几种D2D数据传输方法。然而,没有考虑能源消耗来提高网络吞吐量。为了解决这些问题,本研究引入了一种名为深度神经回归切线传输分类器(Deep Neural Regressive Tangent Transfer Classifier, DNRTTC)模型的人工智能技术,用于6G系统中的D2D数据传输。设计的方法包括多层,以实现节能的D2D数据传输。最主要的一层是输入层,它包括几个移动节点作为输入。节点被传输到隐藏层。对于每个节点,计算每个移动节点的能量、接收信号强度和连接速度。然后在下一层进行相似性分析,其中对每个节点进行阈值分析。结果被发送到输出层,在输出层中使用激活函数识别更好的资源移动节点。这可以在6G中实现节能的D2D数据传输。结果表明,与传统方法相比,DNRTTC具有更好的能效、数据包传输率和吞吐量。
{"title":"Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks","authors":"V. Sridhar, S. Roslin","doi":"10.22247/ijcna/2022/215917","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215917","url":null,"abstract":"– The rising wireless service constraints and user compactness have to lead the progress of 6G communication in the modern days. The benefit of 6G over the presented technologies is a huge support for mixed applications and mobility maintenance. Device to Device (D2D) data transmission in 6G has great attention since it gives a better data delivery rate (DDR). Recently, several methods were established for D2D data transmission. However, energy consumption was not considered to improve the network throughput. To handle such problems, an artificial intelligence technique called Deep Neural Regressive Tangent Transfer Classifier (DNRTTC) model is introduced in this research for D2D data transmission in a 6G system. The designed method includes several layers to attain energy-efficient D2D data transmission. The primary layer is the input layer and it includes several mobile nodes as input. Nodes are transmitted to the hidden layer one. For each node, energy, received signal strength, and connection speed of each mobile node is calculated. Then the similarity analysis is done in the following layer where each node is analyzed with its threshold value. The result is sent to the output layer where the better resource mobile nodes are identified by using the activation function. This leads to attaining energy-efficient D2D data transmission in 6G. Results illustrate that the DNRTTC outperformed compared to conventional methods with better energy efficiency, packet delivery ratio, throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44378330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network 基于混合优化的移动无线传感器网络节能高效路由协议
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215919
V. Veerakumaran, A. Rajini
– Mobile Wireless Sensor Network (MWSN) is a dispersed network having autonomous sensor nodes which monitors physical occurrences or environmental variables in real-time. Most MWSNs have limited energy, so energy efficiency is critical. A node’s data will be routed by one of two standard methods: single-long-hop or short-multi-hop routing paths. The quantity of energy required to deliver a packet grows directly proportional to the packet’s travel distance in MWSN. Single-hop communication in MWSN, on the other hand, is typically relatively energy-intensive. The nodes located nearer to the sink are considerably perform well than the rest of the nodes in MWSN because of the multi-hop connection, resulting in a shorter lifespan for the MWSN. In this paper, Hybrid Optimization-based Efficient Routing Protocol (HOERP) is proposed to minimize the energy consumption in MWSN. HOERP involves grey wolf optimization and particle swarm optimization, where local search is done by grey wolf optimization and the global search optimization is done by particle swarm optimization. Utilizing the nonlinear parameters in HOERP assist in identifying the optimized cum successful route leading to consume less energy. HOERP is evaluated in NS3 using the metrics standardly used in network-oriented researches. Result highlights that HOERP consumes less energy to deliver data packets than the current routing protocols.
–移动无线传感器网络(MWSN)是一个具有自主传感器节点的分散网络,可实时监控物理事件或环境变量。大多数MWSN的能量有限,因此能源效率至关重要。节点的数据将通过两种标准方法之一进行路由:单长跳或短多跳路由路径。递送数据包所需的能量与数据包在MWSN中的行进距离成正比。另一方面,MWSN中的单跳通信通常是相对耗能的。由于多跳连接,位于更靠近汇点的节点比MWSN中的其他节点表现得相当好,导致MWSN的寿命更短。本文提出了一种基于混合优化的高效路由协议(HOERP),以最大限度地降低MWSN的能耗。HOERP包括灰狼优化和粒子群优化,其中局部搜索由灰狼优化完成,全局搜索由粒子群优化完成。利用HOERP中的非线性参数有助于确定优化的成功路线,从而减少能耗。HOERP在NS3中使用面向网络的研究中标准使用的度量进行评估。结果表明,HOERP传输数据包所消耗的能量比当前的路由协议要少。
{"title":"Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network","authors":"V. Veerakumaran, A. Rajini","doi":"10.22247/ijcna/2022/215919","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215919","url":null,"abstract":"– Mobile Wireless Sensor Network (MWSN) is a dispersed network having autonomous sensor nodes which monitors physical occurrences or environmental variables in real-time. Most MWSNs have limited energy, so energy efficiency is critical. A node’s data will be routed by one of two standard methods: single-long-hop or short-multi-hop routing paths. The quantity of energy required to deliver a packet grows directly proportional to the packet’s travel distance in MWSN. Single-hop communication in MWSN, on the other hand, is typically relatively energy-intensive. The nodes located nearer to the sink are considerably perform well than the rest of the nodes in MWSN because of the multi-hop connection, resulting in a shorter lifespan for the MWSN. In this paper, Hybrid Optimization-based Efficient Routing Protocol (HOERP) is proposed to minimize the energy consumption in MWSN. HOERP involves grey wolf optimization and particle swarm optimization, where local search is done by grey wolf optimization and the global search optimization is done by particle swarm optimization. Utilizing the nonlinear parameters in HOERP assist in identifying the optimized cum successful route leading to consume less energy. HOERP is evaluated in NS3 using the metrics standardly used in network-oriented researches. Result highlights that HOERP consumes less energy to deliver data packets than the current routing protocols.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49245642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1