Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.10054892
Xuesong Qiu, Tianfang Yu
{"title":"Towards a transmission control mechanism for data centers based on flow deadline and size over Software Defined Networking","authors":"Xuesong Qiu, Tianfang Yu","doi":"10.1504/ijipt.2023.10054892","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054892","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.10054246
M. Amjad, Sana Zeba
{"title":"Distribution and Tracking Current Live Location of Recognized Criminal Face at Decentralized Blockchain through Image","authors":"M. Amjad, Sana Zeba","doi":"10.1504/ijipt.2023.10054246","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054246","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.10060176
Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.
{"title":"A constant temperature control system for indoor environments in buildings using internet of things","authors":"Ashok Vajravelu, Lakshmi M, Ashokkumar N, Kavitha N.S.","doi":"10.1504/ijipt.2023.10060176","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10060176","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135263017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.10059167
Shasha Zhang, Ying Li, Haiyan Kang
{"title":"An Effective Differential Privacy Protection Method of Location data Based on Perturbation Loss Constraint","authors":"Shasha Zhang, Ying Li, Haiyan Kang","doi":"10.1504/ijipt.2023.10059167","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10059167","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135496945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.133029
Vivek Kumar Jaiswal, Sanjeev Patel
The Transmission Control Protocol (TCP) is a widely used transport layer protocol for reliable IP networks. To handle congestion in the network due to various reasons many algorithms have been designed. In this paper, we have carried out a detailed analysis of the Elastic TCP congestion control algorithm which is based on delay and independent of Round-Trip Time (RTT). Elastic TCP uses a Window-correlated Weighting Function (WWF) for deciding the update of congestion window size. We have proposed an enhanced Elastic (e-Elastic) for further improvement of performance. These algorithms Elastic and e-Elastic are more suitable for the high and moderate Bandwidth-Delay Product (BDT) while we have tested it for moderate BDT on network simulator-3 (ns-3). Our proposed algorithm improves the average throughput with 5.11%, 10.14%, 10.69% and 11.07% over Elastic, CUBIC, Veno and New Reno, respectively.
TCP (Transmission Control Protocol)是一种广泛应用于可靠IP网络的传输层协议。为了处理由于各种原因引起的网络拥塞,人们设计了许多算法。本文详细分析了基于时延且不依赖于往返时间(RTT)的弹性TCP拥塞控制算法。弹性TCP使用窗口相关加权函数(WWF)来决定拥塞窗口大小的更新。我们提出了一个增强的Elastic (e-Elastic),以进一步提高性能。这些算法Elastic和e-Elastic更适合于高和中等带宽延迟积(BDT),我们已经在网络模拟器-3 (ns-3)上对其进行了中等带宽延迟积(BDT)测试。我们提出的算法比Elastic、CUBIC、Veno和New Reno分别提高了5.11%、10.14%、10.69%和11.07%的平均吞吐量。
{"title":"A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP","authors":"Vivek Kumar Jaiswal, Sanjeev Patel","doi":"10.1504/ijipt.2023.133029","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133029","url":null,"abstract":"The Transmission Control Protocol (TCP) is a widely used transport layer protocol for reliable IP networks. To handle congestion in the network due to various reasons many algorithms have been designed. In this paper, we have carried out a detailed analysis of the Elastic TCP congestion control algorithm which is based on delay and independent of Round-Trip Time (RTT). Elastic TCP uses a Window-correlated Weighting Function (WWF) for deciding the update of congestion window size. We have proposed an enhanced Elastic (e-Elastic) for further improvement of performance. These algorithms Elastic and e-Elastic are more suitable for the high and moderate Bandwidth-Delay Product (BDT) while we have tested it for moderate BDT on network simulator-3 (ns-3). Our proposed algorithm improves the average throughput with 5.11%, 10.14%, 10.69% and 11.07% over Elastic, CUBIC, Veno and New Reno, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.10054903
Jie Deng, Haiyan Kang
{"title":"A cross encryption scheme for data security storage in cloud computing environment","authors":"Jie Deng, Haiyan Kang","doi":"10.1504/ijipt.2023.10054903","DOIUrl":"https://doi.org/10.1504/ijipt.2023.10054903","url":null,"abstract":"","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67131786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijipt.2023.133031
Ankit Verma, Suman Deswal
The Internet of Things (IoT) is prevalent in the modern era because of its versatile application in every field. IoT solves real word problems through the connectivity of the internet. Smart devices in IoT control the environment and provide diverse utilities. IoT networks make human life easy by using next-generation technology. Even after various studies on IoT still, the major challenge is routing. Various algorithms are proposed but still remarkable performance is not achieved. The standard algorithm for low-power lossy network (RPL) protocol does not work well in parent selection for bulky networks. FOG-RPL is based on fog computing with an innovative objective function. In this paper, FOG-RPL is proposed and tested on the Cooja simulator with Contiki OS with quality parameters. The simulation of FOG-RPL is performed with performance parameters and results show that the packet loss ratio is 6% and the energy consumption is 0.6 mw, which is 11% more efficient than the existing algorithm.
{"title":"Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks","authors":"Ankit Verma, Suman Deswal","doi":"10.1504/ijipt.2023.133031","DOIUrl":"https://doi.org/10.1504/ijipt.2023.133031","url":null,"abstract":"The Internet of Things (IoT) is prevalent in the modern era because of its versatile application in every field. IoT solves real word problems through the connectivity of the internet. Smart devices in IoT control the environment and provide diverse utilities. IoT networks make human life easy by using next-generation technology. Even after various studies on IoT still, the major challenge is routing. Various algorithms are proposed but still remarkable performance is not achieved. The standard algorithm for low-power lossy network (RPL) protocol does not work well in parent selection for bulky networks. FOG-RPL is based on fog computing with an innovative objective function. In this paper, FOG-RPL is proposed and tested on the Cooja simulator with Contiki OS with quality parameters. The simulation of FOG-RPL is performed with performance parameters and results show that the packet loss ratio is 6% and the energy consumption is 0.6 mw, which is 11% more efficient than the existing algorithm.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136302734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-06DOI: 10.1504/ijipt.2020.10026701
P. Jyotheeswari, N. Jeyanthi
Internet of things (IoT) creates communication between the sensor nodes and smart devices through the internet to collect the data. The utilisation of IoT in the medical field brings more advantage to the patients and doctors for effective monitoring. The confidentiality of the medical data is a crucial factor need to be taken care of by the medical- IoT (M-IoT). This paper concentrates on developing a secure mechanism for medical data management. In this paper, we develop an architecture for managing the large volumes of medical data generated by the sensor nodes. This architecture will provide secure communication for data sharing among doctors and patients in normal and emergency conditions. As a next step, we propose the security mechanism for improving the data integrity and confidentiality. The proposed mechanism uses symmetric encryption and attribute-based encryption to achieve the performance. The simulation results prove the efficiency of the proposed system.
{"title":"Hybrid encryption model for managing the data security in medical internet of things","authors":"P. Jyotheeswari, N. Jeyanthi","doi":"10.1504/ijipt.2020.10026701","DOIUrl":"https://doi.org/10.1504/ijipt.2020.10026701","url":null,"abstract":"Internet of things (IoT) creates communication between the sensor nodes and smart devices through the internet to collect the data. The utilisation of IoT in the medical field brings more advantage to the patients and doctors for effective monitoring. The confidentiality of the medical data is a crucial factor need to be taken care of by the medical- IoT (M-IoT). This paper concentrates on developing a secure mechanism for medical data management. In this paper, we develop an architecture for managing the large volumes of medical data generated by the sensor nodes. This architecture will provide secure communication for data sharing among doctors and patients in normal and emergency conditions. As a next step, we propose the security mechanism for improving the data integrity and confidentiality. The proposed mechanism uses symmetric encryption and attribute-based encryption to achieve the performance. The simulation results prove the efficiency of the proposed system.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":"1 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2020-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41646092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-09DOI: 10.1504/IJIPT.2019.10019368
N. A. Saoucha, B. Benmammar
Link adaptation algorithms design for OFDM-based cognitive radio networks is a challenging task. The main concern is to provide a high quality of service for the secondary user while the mutual interference between this last and the primary user persists within a tolerable range. This issue can be formulated as a multiobjective optimisation constraint problem. To tackle this optimisation problem in a multiobjective constraint framework, in this paper we exploit three of the most recent powerful bio-inspired algorithms: firefly, bat, and cuckoo search. Simulation results revealed that, in contrast to the classical genetic algorithm and particle swarm optimisation-based link adaptation, our proposed algorithms exhibit better performance in terms of convergence speed and solution quality with saving rates reaching over 98.93% and 46.60%, respectively.
{"title":"Bio-inspired Approaches for OFDM Based Cognitive Radio","authors":"N. A. Saoucha, B. Benmammar","doi":"10.1504/IJIPT.2019.10019368","DOIUrl":"https://doi.org/10.1504/IJIPT.2019.10019368","url":null,"abstract":"Link adaptation algorithms design for OFDM-based cognitive radio networks is a challenging task. The main concern is to provide a high quality of service for the secondary user while the mutual interference between this last and the primary user persists within a tolerable range. This issue can be formulated as a multiobjective optimisation constraint problem. To tackle this optimisation problem in a multiobjective constraint framework, in this paper we exploit three of the most recent powerful bio-inspired algorithms: firefly, bat, and cuckoo search. Simulation results revealed that, in contrast to the classical genetic algorithm and particle swarm optimisation-based link adaptation, our proposed algorithms exhibit better performance in terms of convergence speed and solution quality with saving rates reaching over 98.93% and 46.60%, respectively.","PeriodicalId":42931,"journal":{"name":"International Journal of Internet Protocol Technology","volume":" ","pages":""},"PeriodicalIF":0.3,"publicationDate":"2019-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43613868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}