首页 > 最新文献

International Journal of Computer Networks and Communications最新文献

英文 中文
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network 优化网络编码路径,增强无线多媒体传感器网络的编码保护
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15502
Mohammad Javad Abbasi, A. S Abdullah, N Fisal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
无线传感器网络中多媒体数据传输的有效保护技术是一个非常关键的问题。在有噪声的无线多媒体传感器网络(WMSN)中,由于带宽和能量的限制以及信道条件的不可预测,服务质量(QoS)是一项具有挑战性的任务。因此,前向纠错(FEC)这一类信道编码被广泛应用于无线传感器网络。然而,多媒体数据的庞大尺寸使得在多跳噪声无线网络上传输变得更加困难。此外,FEC的效率随着跳数的增加而下降。本文提出了一种基于网络编码和无速率码的优化保护技术,以提高WMSN的吞吐量,降低数据传输的开销。通过最优网络路径模型(ONPM)提高NCP-OPR的性能,其中使用粒子群优化(PSO)最优选择最佳可用路径。结合所提出的保护方案,所提出的ONPM旨在通过在网络路径之间优化分配功率,从而提高吞吐量,从而用于有限功率的WSN。
{"title":"Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network","authors":"Mohammad Javad Abbasi, A. S Abdullah, N Fisal","doi":"10.5121/ijcnc.2023.15502","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15502","url":null,"abstract":"Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on CDN Vulnerability to DoS Attacks 针对DoS攻击的CDN漏洞调查
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15508
Maurizio D’Arienzo, Serena Gracco
Content Delivery Networks (CDN), or ”content distribution networks” have been introduced to improve performance, scalability, and security of data distributed through the web. To reduce the response time of a web page when certain content is requested, the CDN redirects requests from users’ browsers to geographically distributed surrogate nodes, thus having a positive impact on the response time and network load. As a side effect, the surrogate servers manage possible attacks, especially denial of service attacks, by distributing the considerable amount of traffic generated by malicious activities among different data centers. Some CDNs provide additional services to normalize traffic and filter intrusion attacks, thus further mitigating the effects of possible unpleasant scenarios. Despite the presence of these native protective mechanisms, a malicious user can undermine the stability of a CDN by generating a disproportionate amount of traffic within a CDN thanks to endless cycles of requests circulating between nodes of the same network or between several distinct networks. We refer in particular to Forwarding Loops Attacks, a collection of techniques that can alter the regular forwarding process inside CDNs. In this paper, we analyze the vulnerability of some commercial CDNs to this type of attacks and then propose some possible useful defensive strategies.
内容交付网络(CDN)或“内容分发网络”的引入是为了提高通过web分发的数据的性能、可伸缩性和安全性。CDN将来自用户浏览器的请求重定向到地理上分布的代理节点,从而对响应时间和网络负载产生积极的影响,从而减少网页在请求某些内容时的响应时间。作为一个副作用,代理服务器通过在不同的数据中心分配恶意活动产生的大量流量来管理可能的攻击,特别是拒绝服务攻击。一些cdn提供额外的服务来规范流量和过滤入侵攻击,从而进一步减轻可能出现的不愉快情况的影响。尽管存在这些本地保护机制,恶意用户可以通过在CDN内产生不成比例的流量来破坏CDN的稳定性,这要感谢在同一网络节点之间或几个不同网络之间循环的请求的无限循环。我们特别提到转发循环攻击,这是一组可以改变cdn内部常规转发过程的技术。在本文中,我们分析了一些商业cdn对这类攻击的脆弱性,并提出了一些可能有用的防御策略。
{"title":"A Survey on CDN Vulnerability to DoS Attacks","authors":"Maurizio D’Arienzo, Serena Gracco","doi":"10.5121/ijcnc.2023.15508","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15508","url":null,"abstract":"Content Delivery Networks (CDN), or ”content distribution networks” have been introduced to improve performance, scalability, and security of data distributed through the web. To reduce the response time of a web page when certain content is requested, the CDN redirects requests from users’ browsers to geographically distributed surrogate nodes, thus having a positive impact on the response time and network load. As a side effect, the surrogate servers manage possible attacks, especially denial of service attacks, by distributing the considerable amount of traffic generated by malicious activities among different data centers. Some CDNs provide additional services to normalize traffic and filter intrusion attacks, thus further mitigating the effects of possible unpleasant scenarios. Despite the presence of these native protective mechanisms, a malicious user can undermine the stability of a CDN by generating a disproportionate amount of traffic within a CDN thanks to endless cycles of requests circulating between nodes of the same network or between several distinct networks. We refer in particular to Forwarding Loops Attacks, a collection of techniques that can alter the regular forwarding process inside CDNs. In this paper, we analyze the vulnerability of some commercial CDNs to this type of attacks and then propose some possible useful defensive strategies.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network 固定电网系统容量与频谱效率分析
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15506
M, Adarsha, Malathi, S., Kumar, Santosh
In this article, the performance of a fixed grid network is examined for various modulation formats to estimate the system's capacity and spectral efficiency. The optical In-phase Quadrature Modulator (IQM) structure is used to build a fixed grid network modulation, and the homodyne detection approach is used for the receiver. Data multiplexing is accomplished using the Polarization Division Multiplexed (PDM) technology. 100 Gbps, 150 Gbps, and 200 Gbps data rates are transmitted under these circumstances utilizing various modulation formats. Various pre-processing and signal recovery steps are explained by using modern digital signal processing systems. The achieved spectrum efficiencies for PM-QPSK, PM-8 QAM, and PM-16 QAM, respectively, were 2, 3, and 4 (bits/s)/Hz. Different modulation like PM-QPSK, PM-8-QAM, and PM-16-QAM each has system capacities of 8-9, 12-13.5, and 16-18 Tbps and it reaches transmission distances of 3000, 1300, and 700 kilometers with acceptable Bit Error Rate (BER≤ 2× 10-3 ) respectively. Peak optical power for received signal detection and full width at half maximum is noted for the different modulations under a fixed grind network.
在本文中,研究了固定网格网络的各种调制格式的性能,以估计系统的容量和频谱效率。采用光学同相正交调制器(IQM)结构构建固定网格网络调制,接收机采用纯差检测方法。数据复用使用偏振分复用(PDM)技术来实现。在这些情况下,利用各种调制格式传输100gbps、150gbps和200gbps数据速率。利用现代数字信号处理系统解释了各种预处理和信号恢复步骤。PM-QPSK、PM-8 QAM和PM-16 QAM的频谱效率分别为2、3和4 (bits/s)/Hz。PM-QPSK、PM-8-QAM和PM-16-QAM的系统容量分别为8- 9,12 -13.5和16- 18tbps,传输距离分别为3000公里、1300公里和700公里,可接受的误码率(BER≤2× 10-3)。在固定研磨网络下,对不同调制方式的接收信号检测的峰值光功率和半最大全宽进行了说明。
{"title":"Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network","authors":"M, Adarsha, Malathi, S., Kumar, Santosh","doi":"10.5121/ijcnc.2023.15506","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15506","url":null,"abstract":"In this article, the performance of a fixed grid network is examined for various modulation formats to estimate the system's capacity and spectral efficiency. The optical In-phase Quadrature Modulator (IQM) structure is used to build a fixed grid network modulation, and the homodyne detection approach is used for the receiver. Data multiplexing is accomplished using the Polarization Division Multiplexed (PDM) technology. 100 Gbps, 150 Gbps, and 200 Gbps data rates are transmitted under these circumstances utilizing various modulation formats. Various pre-processing and signal recovery steps are explained by using modern digital signal processing systems. The achieved spectrum efficiencies for PM-QPSK, PM-8 QAM, and PM-16 QAM, respectively, were 2, 3, and 4 (bits/s)/Hz. Different modulation like PM-QPSK, PM-8-QAM, and PM-16-QAM each has system capacities of 8-9, 12-13.5, and 16-18 Tbps and it reaches transmission distances of 3000, 1300, and 700 kilometers with acceptable Bit Error Rate (BER≤ 2× 10-3 ) respectively. Peak optical power for received signal detection and full width at half maximum is noted for the different modulations under a fixed grind network.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135427325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Aware Tracking and Tracing System 具有隐私意识的跟踪和追踪系统
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15507
Ali M. Allam
The ability to track and trace assets in the supply chain is becoming increasingly important. In addition to asset tracking, the technologies used provide new opportunities for collecting and analyzing employee position and biometric data. As a result, these technologies can be used to monitor performance or track worker behavior, resulting in additional risks and stress for employees. Furthermore, contact tracing systems used to contain the COVID-19 outbreak have made positive patients' privacy public, resulting in violations of users' rights and even endangering their lives. To resolve this situation, a verifiable attributebased encryption (ABE) scheme based on homomorphic encryption and zero-knowledge identification (ZKI) is proposed, with ZKI providing anonymity for data owners to resist tracking attacks and homomorphic encryption used to solve the problem of privacy leakage from location inquiries returned from a semi-honest server. Finally, theoretical security analysis and formal security verification show that our scheme is secure against the chosen plaintext attack (CPA) and other attacks. Besides that, our novel scheme is efficient enough in terms of user-side computation overhead for practical applications.
在供应链中跟踪和追踪资产的能力变得越来越重要。除了资产跟踪之外,所使用的技术还为收集和分析员工职位和生物特征数据提供了新的机会。因此,这些技术可用于监控绩效或跟踪员工行为,从而给员工带来额外的风险和压力。此外,为遏制新冠肺炎疫情而使用的接触者追踪系统使阳性患者的隐私公开,侵犯了用户的权利,甚至危及他们的生命。针对这种情况,提出了一种基于同态加密和零知识识别(ZKI)的可验证的基于属性的加密(ABE)方案,ZKI为数据所有者提供匿名性以抵抗跟踪攻击,而同态加密用于解决半诚实服务器返回的位置查询的隐私泄露问题。最后,通过理论安全性分析和形式安全性验证,证明了该方案对选择明文攻击(CPA)和其他攻击是安全的。此外,就实际应用而言,我们的新方案在用户端计算开销方面足够有效。
{"title":"A Privacy-Aware Tracking and Tracing System","authors":"Ali M. Allam","doi":"10.5121/ijcnc.2023.15507","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15507","url":null,"abstract":"The ability to track and trace assets in the supply chain is becoming increasingly important. In addition to asset tracking, the technologies used provide new opportunities for collecting and analyzing employee position and biometric data. As a result, these technologies can be used to monitor performance or track worker behavior, resulting in additional risks and stress for employees. Furthermore, contact tracing systems used to contain the COVID-19 outbreak have made positive patients' privacy public, resulting in violations of users' rights and even endangering their lives. To resolve this situation, a verifiable attributebased encryption (ABE) scheme based on homomorphic encryption and zero-knowledge identification (ZKI) is proposed, with ZKI providing anonymity for data owners to resist tracking attacks and homomorphic encryption used to solve the problem of privacy leakage from location inquiries returned from a semi-honest server. Finally, theoretical security analysis and formal security verification show that our scheme is secure against the chosen plaintext attack (CPA) and other attacks. Besides that, our novel scheme is efficient enough in terms of user-side computation overhead for practical applications.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT 节能改进最优K-Means:基于延迟MWSN-IoT第一个节点死亡的动态簇头选择
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15503
Awatef Chniguir, Zouhair Ben Jemaa
The Internet of Things (IoT), which attaches dynamic devices that can access the Internet to create a smart environment, is a tempting research area. IoT-based mobile wireless sensor networks (WSN-IoT) are one of the major databases from which the IoT collects data for analysis and interpretation. However, one of the critical constraints is network lifetime. Routing-based clustered protocols and cluster head (CH) selection are crucial in load balancing and sensor longevity. Yet, with clustering, sensor node mobility requires more overhead because the nodes close to the center may get far and thus become unsuitable to be a CH, whereas those far from the center may get close and become good CH candidates, influencing energy consumption. This paper suggests an energy-efficient clustering protocol with a dynamic cluster head selection considering the distance to the cluster center, remaining energy, and each node's mobility degree implementing a rotation mechanism that allows cluster members to be equally elected while prioritizing those with the minimum weight. The advised algorithm aims to delay the first node death (FND) and thus prolong the stability period and minimize energy consumption by avoiding re-clustering. The performance of the proposed protocol exceeds that achieved in our previous work, Improved OKmeans, by 11%, in first dead node lifetime maximization, 43% in throughput, and 44% in energy efficiency.
物联网(IoT)是一个诱人的研究领域,它将可以访问互联网的动态设备连接起来,创造一个智能环境。基于物联网的移动无线传感器网络(WSN-IoT)是物联网收集数据进行分析和解释的主要数据库之一。然而,一个关键的限制是网络生命周期。基于路由的集群协议和簇头(CH)选择对于负载平衡和传感器寿命至关重要。然而,在聚类中,传感器节点的移动需要更多的开销,因为靠近中心的节点可能会变远而不适合作为CH,而远离中心的节点可能会变近而成为良好的CH候选者,从而影响能量消耗。本文提出了一种考虑到簇中心距离、剩余能量和每个节点移动度的动态簇头选择的节能聚类协议,该协议实现了一种轮换机制,使簇成员在权重最小的情况下被平等地选择。建议的算法旨在通过避免重新聚类来延迟第一个节点死亡(FND),从而延长稳定周期和最小化能量消耗。提出的协议的性能超过了我们之前的工作,改进的OKmeans,在第一个死节点寿命最大化方面提高了11%,吞吐量提高了43%,能源效率提高了44%。
{"title":"Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT","authors":"Awatef Chniguir, Zouhair Ben Jemaa","doi":"10.5121/ijcnc.2023.15503","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15503","url":null,"abstract":"The Internet of Things (IoT), which attaches dynamic devices that can access the Internet to create a smart environment, is a tempting research area. IoT-based mobile wireless sensor networks (WSN-IoT) are one of the major databases from which the IoT collects data for analysis and interpretation. However, one of the critical constraints is network lifetime. Routing-based clustered protocols and cluster head (CH) selection are crucial in load balancing and sensor longevity. Yet, with clustering, sensor node mobility requires more overhead because the nodes close to the center may get far and thus become unsuitable to be a CH, whereas those far from the center may get close and become good CH candidates, influencing energy consumption. This paper suggests an energy-efficient clustering protocol with a dynamic cluster head selection considering the distance to the cluster center, remaining energy, and each node's mobility degree implementing a rotation mechanism that allows cluster members to be equally elected while prioritizing those with the minimum weight. The advised algorithm aims to delay the first node death (FND) and thus prolong the stability period and minimize energy consumption by avoiding re-clustering. The performance of the proposed protocol exceeds that achieved in our previous work, Improved OKmeans, by 11%, in first dead node lifetime maximization, 43% in throughput, and 44% in energy efficiency.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System 智能交通系统无线传感器网络最优覆盖路径规划
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15504
Saureng Kumar, S C Sharma
With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.
随着智能和通信技术的提高,智能交通对许多人的基本服务起着至关重要的作用,使他们能够快速方便地从一个地方到另一个地方。无线传感器网络(WSN)以其检测物理障碍的能力而闻名,这是由于其多样化的运动,自组织能力,并且随着这些车辆的激增,将这种移动节点集成到智能交通系统中以收集WSN环境中的数据正变得越来越受欢迎。虽然这些移动设备可能会提高网络性能,但由于网络连接的能源有限,很难设计出合适的传输路径。为了解决这一问题,我们提出了一种新的行程规划模式数据收集器(IPS-DG)模型。此外,我们还使用路径规划模块(PPM)来寻找最短距离的运输路径。我们比较了低能量自适应聚类层次(LEACH)、多跳加权收益(MWR)、单跳数据收集过程(SHDGP)在寿命、能量消耗和路径长度等不同方面的结果。我们的模型在能耗、最短路径和最长寿命方面优于LEACH、MWR、SHDGP路由协议。
{"title":"Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System","authors":"Saureng Kumar, S C Sharma","doi":"10.5121/ijcnc.2023.15504","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15504","url":null,"abstract":"With the enhancement of the intelligent and communication technology, an intelligent transportation plays a vital role to facilitate an essential service to many people, allowing them to travel quickly and conveniently from place to place. Wireless sensor networks (WSNs) are well-known for their ability to detect physical significant barriers due to their diverse movement, self-organizing capabilities, and the integration of this mobile node on the intelligent transportation system to gather data in WSN contexts is becoming more and more popular as these vehicles proliferate. Although these mobile devices might enhance network performance, however it is difficult to design a suitable transportation path with the limited energy resources with network connectivity. To solve this problem, we have proposed a novel itinerary planning schema data gatherer (IPS-DG) model. Furthermore, we use the path planning module (PPM) which finds the transportation path to travel the shortest distance. We have compared our results under different aspect such as life span, energy consumption, and path length with Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-Hop Weighted Revenue (MWR), Single-Hop Data Gathering Procedure (SHDGP). Our model outperforms in terms of energy usage, shortest path, and longest life span of with LEACH, MWR, SHDGP routing protocols.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks 基于Salp群的异构无线网络节能路由协议
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15505
Salima Nebti, Mohammed Redjimi
Routing is a persistent concern in wireless sensor networks (WSNs), as getting data from sources to destinations can be a tricky task. Challenges include safeguarding the data being transferred, ensuring network longevity, and preserving energy in harsh environmental conditions. Consequently, this study delves into the suitability of using multi-objective swarm optimization to route heterogeneous WSNs in the hope of mitigating these issues while boosting the speed and accuracy of data transmission. In order to achieve better performance in terms of load balancing and reducing energy expenditure, the MOSSA-BA algorithm was developed. This algorithm combines the Multi-Objective Salp Swarm Algorithm (MOSSA) with the exploiting strategy of the artificial bee colony (BA) in the neighbourhood of Salps. Inspired by the SEP and EDEEC protocols, the integrated solutions of MOSSA-BA were used to route two and three levels of heterogeneous networks. The embedded solutions provided outstanding performance in regards to FND, HND, LND, percentage of remaining energy, and the number of packages delivered to the base station. Compared to SEP, EDEEC, and other competitors based on MOSSA and a modified multi-objective particle swarm optimization (MOPSO), the MOSSA-BA-based protocols demonstrated energy-saving percentages of more than 34% in medium-sized areas of interest and over 22% in large-sized areas of detection.
路由是无线传感器网络(wsn)一直关注的问题,因为将数据从源发送到目的地可能是一项棘手的任务。挑战包括保护传输的数据,确保网络寿命,以及在恶劣环境条件下节约能源。因此,本研究深入探讨了使用多目标群优化来路由异构WSNs的适用性,以期在提高数据传输速度和准确性的同时缓解这些问题。为了在负载均衡和降低能量消耗方面获得更好的性能,开发了MOSSA-BA算法。该算法将多目标Salp Swarm算法(MOSSA)与Salp邻域人工蜂群(BA)开发策略相结合。受SEP和edec协议的启发,MOSSA-BA的集成解决方案被用于路由二级和三级异构网络。嵌入式解决方案在FND、HND、LND、剩余能量百分比和发送到基站的数据包数量方面提供了出色的性能。与SEP、EDEEC和其他基于MOSSA和改进的多目标粒子群优化(MOPSO)的竞争对手相比,基于MOSSA- ba的协议在中型感兴趣区域的节能百分比超过34%,在大型检测区域的节能百分比超过22%。
{"title":"Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks","authors":"Salima Nebti, Mohammed Redjimi","doi":"10.5121/ijcnc.2023.15505","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15505","url":null,"abstract":"Routing is a persistent concern in wireless sensor networks (WSNs), as getting data from sources to destinations can be a tricky task. Challenges include safeguarding the data being transferred, ensuring network longevity, and preserving energy in harsh environmental conditions. Consequently, this study delves into the suitability of using multi-objective swarm optimization to route heterogeneous WSNs in the hope of mitigating these issues while boosting the speed and accuracy of data transmission. In order to achieve better performance in terms of load balancing and reducing energy expenditure, the MOSSA-BA algorithm was developed. This algorithm combines the Multi-Objective Salp Swarm Algorithm (MOSSA) with the exploiting strategy of the artificial bee colony (BA) in the neighbourhood of Salps. Inspired by the SEP and EDEEC protocols, the integrated solutions of MOSSA-BA were used to route two and three levels of heterogeneous networks. The embedded solutions provided outstanding performance in regards to FND, HND, LND, percentage of remaining energy, and the number of packages delivered to the base station. Compared to SEP, EDEEC, and other competitors based on MOSSA and a modified multi-objective particle swarm optimization (MOPSO), the MOSSA-BA-based protocols demonstrated energy-saving percentages of more than 34% in medium-sized areas of interest and over 22% in large-sized areas of detection.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135469961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BLE Beacon with Data Accumulation Functionality 具有数据积累功能的BLE信标
Q3 Computer Science Pub Date : 2023-09-28 DOI: 10.5121/ijcnc.2023.15501
KOBAYASHI Kakeru, FUJITA Satoshi
This research looks into the implementation and utilization of BLE beacons with data accumulation functionality. BLE applications are typically divided into two categories: one that broadcasts a fixed value for each device, and the other that identifies contact with a particular user by scanning the data broadcasted in its surroundings. The proposed framework, however, follows a different approach where each beacon scans for data broadcasted in the area, then changes state based on the scan result, and finally, broadcasts data based on the new state. This can be regarded as an extension of the BLE mesh standard, which enables data flooding through repeated scanning and broadcasting. The paper also explores two practical use cases of the technology: detecting and announcing congestion around devices, and a stamp rally application.
本研究探讨具有数据积累功能的BLE信标的实现与利用。BLE应用通常分为两类:一类是为每个设备广播固定值,另一类是通过扫描周围广播的数据来识别与特定用户的联系。然而,所提出的框架采用了一种不同的方法,其中每个信标扫描区域内广播的数据,然后根据扫描结果改变状态,最后根据新状态广播数据。这可以看作是BLE mesh标准的扩展,它可以通过重复扫描和广播实现数据泛滥。本文还探讨了该技术的两个实际用例:检测和宣布设备周围的拥堵,以及邮票集会应用。
{"title":"BLE Beacon with Data Accumulation Functionality","authors":"KOBAYASHI Kakeru, FUJITA Satoshi","doi":"10.5121/ijcnc.2023.15501","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15501","url":null,"abstract":"This research looks into the implementation and utilization of BLE beacons with data accumulation functionality. BLE applications are typically divided into two categories: one that broadcasts a fixed value for each device, and the other that identifies contact with a particular user by scanning the data broadcasted in its surroundings. The proposed framework, however, follows a different approach where each beacon scans for data broadcasted in the area, then changes state based on the scan result, and finally, broadcasts data based on the new state. This can be regarded as an extension of the BLE mesh standard, which enables data flooding through repeated scanning and broadcasting. The paper also explores two practical use cases of the technology: detecting and announcing congestion around devices, and a stamp rally application.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135470167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET Networks 异构LTE-VANET网络中一种高效的移动网关选择与发现路由协议
Q3 Computer Science Pub Date : 2023-03-30 DOI: 10.5121/ijcnc.2023.15204
Driss Abada, Rachid Adrdor, Omar Boutkhoum, Adil Bohouch
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
将蜂窝通信网络与车辆自组织网络(VANET)相结合可能是为道路上的车辆提供互联网接入的一种非常有趣的方式。然而,由于vanet的几个特定特性,通过长期演进(LTE)技术实现从车载源到互联网网关的高效多跳路由仍然具有挑战性。本文提出了一种互联网移动网关选择方案,以选择更多潜在的车辆作为互联网网关。因此,通过一种高效的基于多度量的中继选择机制来发现和选择到这些移动网关的路由。目标是通过减少通信开销和执行无缝切换来选择更可靠的移动网关路由。基于分组传输率、端到端平均时延和开销,将该协议与现有协议进行了比较。结果表明,与其他协议相比,该协议显著改善了网络性能。
{"title":"An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET Networks","authors":"Driss Abada, Rachid Adrdor, Omar Boutkhoum, Adil Bohouch","doi":"10.5121/ijcnc.2023.15204","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15204","url":null,"abstract":"Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135374866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET 在MANET中使用区块链技术减轻攻击的安全路由协议
Q3 Computer Science Pub Date : 2023-03-30 DOI: 10.5121/ijcnc.2023.15207
Nitesh Ghodichor, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar
MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.
MANET是移动节点的集合,当它们从一个点移动到另一个点时,通过无线网络进行通信。MANET是一种具有可变拓扑结构的无基础设施网络;因此,它很容易受到攻击。防MANET攻击是一个严重的难题。恶意网络节点是网络攻击的源头。在MANET中,攻击可以采取各种形式,每一种攻击都以其独特的方式改变网络的运行。一般来说,攻击可以分为两类:针对网络中的数据流量的攻击和针对控制流量的攻击。本文解释了多种攻击,它们对MANET的影响,以及目前正在实施的基于MANET的防御措施。建议采用区块链技术(SRABC)的SRA保护MANET免受攻击并对节点进行身份验证。区块链技术提出的安全路由算法(SRA)保护控制和数据流免受威胁。这是通过为每个事务生成哈希函数来实现的。我们将从讨论MANET的安全性开始。本文的第二部分探讨了区块链在MANET安全中的作用。在第三部分中,SRA与区块链相关。在第四阶段,PDR和吞吐量被用于使用区块链进行SRA审查,使用PDR和吞吐量。结果表明,该方法在降低时延的同时提高了网络的安全性。分析了该技术的性能,并与Q-AODV和DSR路由协议进行了比较。
{"title":"Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET","authors":"Nitesh Ghodichor, Raj Thaneeghavl V, Dinesh Sahu, Gautam Borkar, Ankush Sawarkar","doi":"10.5121/ijcnc.2023.15207","DOIUrl":"https://doi.org/10.5121/ijcnc.2023.15207","url":null,"abstract":"MANET is a collection of mobile nodes that communicate through wireless networks as they move from one point to another. MANET is an infrastructure-less network with a changeable topology; as a result, it is very susceptible to attacks. MANET attack prevention represents a serious difficulty. Malicious network nodes are the source of network-based attacks. In a MANET, attacks can take various forms, and each one alters the network's operation in its unique way. In general, attacks can be separated into two categories: those that target the data traffic on a network and those that target the control traffic. This article explains the many sorts of assaults, their impact on MANET, and the MANET-based defence measures that are currently in place. The suggested SRA that employs blockchain technology (SRABC) protects MANET from attacks and authenticates nodes. The secure routing algorithm (SRA) proposed by blockchain technology safeguards control and data flow against threats. This is achieved by generating a Hash Function for every transaction. We will begin by discussing the security of the MANET. This article's second section explores the role of blockchain in MANET security. In the third section, the SRA is described in connection with blockchain. In the fourth phase, PDR and Throughput are utilised to conduct an SRA review using Blockchain employing PDR and Throughput. The results suggest that the proposed technique enhances MANET security while concurrently decreasing delay. The performance of the proposed technique is analysed and compared to the routing protocols Q-AODV and DSR.","PeriodicalId":37554,"journal":{"name":"International Journal of Computer Networks and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135374867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Networks and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1