Pub Date : 2020-01-21DOI: 10.1504/IJCNDS.2020.10016956
Muhammad Arif, Guojun Wang
This article offers a social networking platform for vehicles, based on cloud computing and service oriented architecture called CSS-IoV for communication and collaboration of vehicle to vehicle (V2V), and vehicle to infrastructure (V2I). CSS-IoV contains five layers: application layer, application service layer, services layer, cloud infrastructure layer, and layer of vehicles. The application layer operation is associated with the functionality of on-board units (OBUs) and road-side units (RSUs). The service layer runs on a service-oriented architecture (SOA) and cloud application services to improve applications. To expand and combine web services on this layer, the application developer and builders can effectively develop the new functions and programs for communication. With the support of dynamic and automated service collaboration, people can easily help and communicate with each other by using OBUs. Our results shows that the proposed scheme provide the best results in terms of both type of communication in VANETs.
{"title":"Cloud-Based Service Oriented Architecture for Social Vehicular Ad-hoc Network Communications","authors":"Muhammad Arif, Guojun Wang","doi":"10.1504/IJCNDS.2020.10016956","DOIUrl":"https://doi.org/10.1504/IJCNDS.2020.10016956","url":null,"abstract":"This article offers a social networking platform for vehicles, based on cloud computing and service oriented architecture called CSS-IoV for communication and collaboration of vehicle to vehicle (V2V), and vehicle to infrastructure (V2I). CSS-IoV contains five layers: application layer, application service layer, services layer, cloud infrastructure layer, and layer of vehicles. The application layer operation is associated with the functionality of on-board units (OBUs) and road-side units (RSUs). The service layer runs on a service-oriented architecture (SOA) and cloud application services to improve applications. To expand and combine web services on this layer, the application developer and builders can effectively develop the new functions and programs for communication. With the support of dynamic and automated service collaboration, people can easily help and communicate with each other by using OBUs. Our results shows that the proposed scheme provide the best results in terms of both type of communication in VANETs.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"24 1","pages":"143-166"},"PeriodicalIF":1.3,"publicationDate":"2020-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44805938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijcnds.2020.10028899
S. Nagadivya, R. Manoharan
{"title":"PREDICTION BASED ENERGY EFFICIENT OPPORTUNISTIC ROUTING PROTOCOL IN WIRELESS SENSOR NETWORKS","authors":"S. Nagadivya, R. Manoharan","doi":"10.1504/ijcnds.2020.10028899","DOIUrl":"https://doi.org/10.1504/ijcnds.2020.10028899","url":null,"abstract":"","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"25 1","pages":"414-432"},"PeriodicalIF":1.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66726627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijcnds.2020.10027341
M. Rajagopala, S. C. Lingareddy
{"title":"Spectrum occupancy based PUEA detection using SVM- PSO in Cognitive Networks","authors":"M. Rajagopala, S. C. Lingareddy","doi":"10.1504/ijcnds.2020.10027341","DOIUrl":"https://doi.org/10.1504/ijcnds.2020.10027341","url":null,"abstract":"","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"25 1","pages":"1"},"PeriodicalIF":1.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66726610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/ijcnds.2020.10024380
Qianlin Liu, Zhijun Yang, Liyong Bao, H. Ding, Zejun Han
{"title":"Analysis of New Multi-priority NP-CSMA Random Multiple Access Ad Hoc Network in MAC Protocol Analysis","authors":"Qianlin Liu, Zhijun Yang, Liyong Bao, H. Ding, Zejun Han","doi":"10.1504/ijcnds.2020.10024380","DOIUrl":"https://doi.org/10.1504/ijcnds.2020.10024380","url":null,"abstract":"","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"25 1","pages":"1"},"PeriodicalIF":1.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66726564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/IJCNDS.2020.104747
IyerSridhar
We focus on the optimisation of lightpath routing in an online space division multiplexing-based elastic optical network (SDM-b-EON). We propose a new online routing algorithm, named as online rout...
{"title":"An online routing algorithm for space division multiplexing-based elastic optical networks","authors":"IyerSridhar","doi":"10.1504/IJCNDS.2020.104747","DOIUrl":"https://doi.org/10.1504/IJCNDS.2020.104747","url":null,"abstract":"We focus on the optimisation of lightpath routing in an online space division multiplexing-based elastic optical network (SDM-b-EON). We propose a new online routing algorithm, named as online rout...","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJCNDS.2020.104747","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66726679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/IJCNDS.2020.10019806
Aneeka Azmat, M. S. Pathan, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Muhammad Qasim Memon
{"title":"An efficient scheme for detecting and isolating gray-hole attacks in AODV based mobile ad hoc networks","authors":"Aneeka Azmat, M. S. Pathan, Jingsha He, Nafei Zhu, Zulfiqar Ali Zardari, Muhammad Qasim Memon","doi":"10.1504/IJCNDS.2020.10019806","DOIUrl":"https://doi.org/10.1504/IJCNDS.2020.10019806","url":null,"abstract":"","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"24 1","pages":"1"},"PeriodicalIF":1.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66726476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.1504/IJCNDS.2020.10021260
Shigenari Nakamura, M. Takizawa, T. Enokido
{"title":"A Topic-based Synchronization (TBS) Protocol in Peer-to-Peer Publish/Subscribe Systems","authors":"Shigenari Nakamura, M. Takizawa, T. Enokido","doi":"10.1504/IJCNDS.2020.10021260","DOIUrl":"https://doi.org/10.1504/IJCNDS.2020.10021260","url":null,"abstract":"","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"24 1","pages":"1"},"PeriodicalIF":1.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66726535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-20DOI: 10.1504/IJCNDS.2019.10020192
Alemtsehay Adhanom, H. M. Melaku
The experience of deploying intrusion detection system (IDS) for securing computer system is being matured. There are knowledge-based (misuse) and anomaly IDS. In knowledge-based IDS, prior knowledge of the attack is needed for detection and during anomaly, behaviour of normal data is studied, when new data is arrived and there is a deviation, it is considered as an attack. In this thesis, we present a hybrid intrusion detection system called behavioural-based cyber intrusion detection system, based on two data mining algorithms, decision tree and association rule mining. The decision tree algorithm is used to detect misuse intrusions but it considers new attacks as normal. Association rule mining works by using the normal output of decision tree as input for further detection. Further, we implement the proposed model using java programming language. We have used a reduced and enhanced non-redundant NSL_KDD dataset for training and testing. Evaluation results show that it provides improved detection rate and lower false alarm rates.
{"title":"A Hybrid Behavioural Based Cyber Intrusion Detection System","authors":"Alemtsehay Adhanom, H. M. Melaku","doi":"10.1504/IJCNDS.2019.10020192","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10020192","url":null,"abstract":"The experience of deploying intrusion detection system (IDS) for securing computer system is being matured. There are knowledge-based (misuse) and anomaly IDS. In knowledge-based IDS, prior knowledge of the attack is needed for detection and during anomaly, behaviour of normal data is studied, when new data is arrived and there is a deviation, it is considered as an attack. In this thesis, we present a hybrid intrusion detection system called behavioural-based cyber intrusion detection system, based on two data mining algorithms, decision tree and association rule mining. The decision tree algorithm is used to detect misuse intrusions but it considers new attacks as normal. Association rule mining works by using the normal output of decision tree as input for further detection. Further, we implement the proposed model using java programming language. We have used a reduced and enhanced non-redundant NSL_KDD dataset for training and testing. Evaluation results show that it provides improved detection rate and lower false alarm rates.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":" ","pages":""},"PeriodicalIF":1.3,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44076732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-15DOI: 10.30534/ijns/2019/01852019
H AdarshaSagar, Govt Sksjti Bangalore India Vtu
{"title":"Enhanced Heterogeneous Cross-Layer Protocol for Wireless Sensor Networks","authors":"H AdarshaSagar, Govt Sksjti Bangalore India Vtu","doi":"10.30534/ijns/2019/01852019","DOIUrl":"https://doi.org/10.30534/ijns/2019/01852019","url":null,"abstract":"","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"31 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2019-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75559188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-07-15DOI: 10.30534/IJNS/2019/01842019
Swathi Sadasivan
It is expected to be in the next 100 years, world’s maximum population is going to be living in cities. Hence the usage of vehicle and its related services will be crucial. As the number of vehicles increases, parking of the vehicle in cities are going to be challenging issue, especially in terms of pollution and maintaining the eco system of the area. Many people are not interested to use traditional or automated parking area because of the difficulty they face during the usage. Even people find it difficult to trace the return path to their own vehicle. The larger number of smart car parking systems is implemented in various countries which normally solve the problem of parking space and effective utilization of utilities. But in a highly populated area safety of the people in a parking slot and retracing of the vehicle is going to be very challenging due to its nature of heterogeneous people and variety of vehicles. An IOT enabled Sensor network based Advanced parking space with camera and audio sensors will be able to collect large amount of data which can be utilized to generate interesting pattern using suitable machine learning algorithm. As the environment is complex and heterogeneous; a better optimization always will be able to provide improved safety to the people as well as vehicle in the area.
{"title":"IOT based Wireless Sensor Network for Retracing the parked Vehicle","authors":"Swathi Sadasivan","doi":"10.30534/IJNS/2019/01842019","DOIUrl":"https://doi.org/10.30534/IJNS/2019/01842019","url":null,"abstract":"It is expected to be in the next 100 years, world’s maximum population is going to be living in cities. Hence the usage of vehicle and its related services will be crucial. As the number of vehicles increases, parking of the vehicle in cities are going to be challenging issue, especially in terms of pollution and maintaining the eco system of the area. Many people are not interested to use traditional or automated parking area because of the difficulty they face during the usage. Even people find it difficult to trace the return path to their own vehicle. The larger number of smart car parking systems is implemented in various countries which normally solve the problem of parking space and effective utilization of utilities. But in a highly populated area safety of the people in a parking slot and retracing of the vehicle is going to be very challenging due to its nature of heterogeneous people and variety of vehicles. An IOT enabled Sensor network based Advanced parking space with camera and audio sensors will be able to collect large amount of data which can be utilized to generate interesting pattern using suitable machine learning algorithm. As the environment is complex and heterogeneous; a better optimization always will be able to provide improved safety to the people as well as vehicle in the area.","PeriodicalId":45170,"journal":{"name":"International Journal of Communication Networks and Distributed Systems","volume":"77 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73664899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}