首页 > 最新文献

International Journal of Future Generation Communication and Networking最新文献

英文 中文
A Survey of Fault Tolerance Management Frameworks, Fault Detection and Recovery Techniques for WSNs 无线传感器网络容错管理框架、故障检测与恢复技术综述
Pub Date : 2018-07-31 DOI: 10.14257/IJFGCN.2018.11.4.04
M. Haghparast, Farnaz Azadi, Mehrdad Maeen
Due to the ease of use and extensive capabilities, wireless sensor networks are widely used. One of the important features that these networks need to have is reliability so that if a fault occurs in the system it can provide expected services and its main function won't be impressed. To establish and maintain reliability, wireless sensor networks must be fault tolerant and be protected against fault occurrence using the right techniques and be prevented from turning into errors and creating failures. In order to make a wireless sensor network fault tolerant it is important to be aware of faults that may happen in system and selecting the best detection, recovery or management techniques. In this article, we will explore a variety of problems that are threaten the reliability of wireless sensor networks and techniques to detect and recover them. Also, fault management techniques and fault tolerant management frameworks in WSNs will be explained and compared and comprehensive study of fault recovery methods will be provided.
由于易于使用和广泛的功能,无线传感器网络被广泛应用。这些网络需要具备的一个重要特征是可靠性,这样如果系统发生故障,它可以提供预期的服务,而不会影响其主要功能。为了建立和保持可靠性,无线传感器网络必须具有容错性,并使用正确的技术防止故障发生,防止转变为错误和产生故障。为了使无线传感器网络具有容错性,重要的是要意识到系统中可能发生的故障,并选择最佳的检测、恢复或管理技术。在本文中,我们将探讨威胁无线传感器网络可靠性的各种问题以及检测和恢复无线传感器网络的技术。同时,对无线传感器网络中的故障管理技术和容错管理框架进行了阐述和比较,并对故障恢复方法进行了全面的研究。
{"title":"A Survey of Fault Tolerance Management Frameworks, Fault Detection and Recovery Techniques for WSNs","authors":"M. Haghparast, Farnaz Azadi, Mehrdad Maeen","doi":"10.14257/IJFGCN.2018.11.4.04","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.4.04","url":null,"abstract":"Due to the ease of use and extensive capabilities, wireless sensor networks are widely used. One of the important features that these networks need to have is reliability so that if a fault occurs in the system it can provide expected services and its main function won't be impressed. To establish and maintain reliability, wireless sensor networks must be fault tolerant and be protected against fault occurrence using the right techniques and be prevented from turning into errors and creating failures. In order to make a wireless sensor network fault tolerant it is important to be aware of faults that may happen in system and selecting the best detection, recovery or management techniques. In this article, we will explore a variety of problems that are threaten the reliability of wireless sensor networks and techniques to detect and recover them. Also, fault management techniques and fault tolerant management frameworks in WSNs will be explained and compared and comprehensive study of fault recovery methods will be provided.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45267455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Half Code Rate Generalized Complex Orthogonal Space Time Block Codes for Multiple Transmit Antennas 用于多发射天线的半码率广义复正交空时分组码的设计
Pub Date : 2018-07-31 DOI: 10.14257/IJFGCN.2018.11.4.03
Jaipreet Kaur, M. Singh
This paper investigates the maximum likelihood (ML) decoding of complex orthogonal structure of the space time block codes (STBC) having rate 1/2 of multiple input single output (MISO) systems with 2, 3, 4, 5, 6, 7, 8 and 9 transmit antennas. The objective is to explore generator matrices of complex signal constellations that provide high rate as well as full diversity by allowing the simple ML decoding of the symbols. KeywordsOrthogonal space time block codes (OSTBC), maximum likelihood (ML), multiple input single output (MISO, bit error rate (BER), transmit diversity, Alamouti
本文研究了具有2、3、4、5、6、7、8和9个发射天线的多输入单输出(MISO)系统中具有1/2速率的空时分组码(STBC)的复正交结构的最大似然(ML)解码。目的是探索通过允许符号的简单ML解码来提供高速率和完全分集的复杂信号星座的生成器矩阵。关键词正交空时分组码(OSTBC)、最大似然(ML)、多输入单输出(MISO)、误码率(BER)、发射分集、Alamouti
{"title":"Design of Half Code Rate Generalized Complex Orthogonal Space Time Block Codes for Multiple Transmit Antennas","authors":"Jaipreet Kaur, M. Singh","doi":"10.14257/IJFGCN.2018.11.4.03","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.4.03","url":null,"abstract":"This paper investigates the maximum likelihood (ML) decoding of complex orthogonal structure of the space time block codes (STBC) having rate 1/2 of multiple input single output (MISO) systems with 2, 3, 4, 5, 6, 7, 8 and 9 transmit antennas. The objective is to explore generator matrices of complex signal constellations that provide high rate as well as full diversity by allowing the simple ML decoding of the symbols. KeywordsOrthogonal space time block codes (OSTBC), maximum likelihood (ML), multiple input single output (MISO, bit error rate (BER), transmit diversity, Alamouti","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47630252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LoRaWAN Performance Evaluation with Optimized Configuration 优化配置下的LoRaWAN性能评估
Pub Date : 2018-07-31 DOI: 10.14257/IJFGCN.2018.11.4.05
R. Harwahyu, Alfan Presekal, R. F. Sari
LoRaWAN is an access technology coupled with protocol stack specification which is exclusively presented to serve IoT application. IoT application commonly has small data and infrequent transmission. However, the challenge in presenting wireless access technology for IoT lies in its characteristic of massive node deployment and powerconstrained transmission. Among several technologies, LoRaWAN promises the ability to handle massive number of nodes, longer transmission range, lower power consumption, as well as cheaper communication module. This paper presents a performance evaluation of LoRa network in respect to those claims. The performance of the network in term of packet delivery ratio, average energy consumption per transmission and average energy wasted in collision per nodes are investigated. A realistic scenario is considered, and the scalability study is also conducted via computer simulation. The result shows that the performance of LoRa network is highly dependent to the configuration of spreading factor, coding rate, and frequency selection. The performed experiment shows that the limitation inherited from pure ALOHA access strategy can be alleviated by randomizing frequency selection and node-specific optimization to maximize data rate relative to its location (i.e. channel condition) and contention severity.
LoRaWAN是一种与协议栈规范相结合的接入技术,专门为物联网应用提供服务。物联网应用通常数据量小,传输频率低。然而,为物联网提供无线接入技术的挑战在于其大规模节点部署和功率受限传输的特点。在几种技术中,LoRaWAN承诺能够处理大量节点、更长的传输范围、更低的功耗以及更便宜的通信模块。本文针对这些声明对LoRa网络进行了性能评估。研究了网络在数据包传输率、每次传输的平均能耗和每个节点在冲突中平均浪费的能量方面的性能。考虑了一个现实的场景,并通过计算机模拟进行了可扩展性研究。结果表明,LoRa网络的性能在很大程度上取决于扩频因子、码率和频率选择的配置。所执行的实验表明,可以通过随机化频率选择和节点特定优化来最大化相对于其位置(即信道条件)和竞争严重性的数据速率,来减轻从纯ALOHA接入策略继承的限制。
{"title":"LoRaWAN Performance Evaluation with Optimized Configuration","authors":"R. Harwahyu, Alfan Presekal, R. F. Sari","doi":"10.14257/IJFGCN.2018.11.4.05","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.4.05","url":null,"abstract":"LoRaWAN is an access technology coupled with protocol stack specification which is exclusively presented to serve IoT application. IoT application commonly has small data and infrequent transmission. However, the challenge in presenting wireless access technology for IoT lies in its characteristic of massive node deployment and powerconstrained transmission. Among several technologies, LoRaWAN promises the ability to handle massive number of nodes, longer transmission range, lower power consumption, as well as cheaper communication module. This paper presents a performance evaluation of LoRa network in respect to those claims. The performance of the network in term of packet delivery ratio, average energy consumption per transmission and average energy wasted in collision per nodes are investigated. A realistic scenario is considered, and the scalability study is also conducted via computer simulation. The result shows that the performance of LoRa network is highly dependent to the configuration of spreading factor, coding rate, and frequency selection. The performed experiment shows that the limitation inherited from pure ALOHA access strategy can be alleviated by randomizing frequency selection and node-specific optimization to maximize data rate relative to its location (i.e. channel condition) and contention severity.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47664407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of the Effectiveness of Cloud Control Matrix for Hybrid Cloud Computing 混合云计算中云控制矩阵的有效性分析
Pub Date : 2018-07-31 DOI: 10.14257/IJFGCN.2018.11.4.01
M. Tariq
{"title":"Analysis of the Effectiveness of Cloud Control Matrix for Hybrid Cloud Computing","authors":"M. Tariq","doi":"10.14257/IJFGCN.2018.11.4.01","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.4.01","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42033959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Benefits of Network Security and Mass Communication Systems for Journalism Education in Nigeria 网络安全和大众传播系统对尼日利亚新闻教育的好处
Pub Date : 2018-07-31 DOI: 10.14257/ijfgcn.2018.11.4.02
J. O. Wogu, Christian Alozie Ogbonna
{"title":"Benefits of Network Security and Mass Communication Systems for Journalism Education in Nigeria","authors":"J. O. Wogu, Christian Alozie Ogbonna","doi":"10.14257/ijfgcn.2018.11.4.02","DOIUrl":"https://doi.org/10.14257/ijfgcn.2018.11.4.02","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42254981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Different Spatial Interpolation Techniques of Field Measurements to Construct Radio Environment Map 野外测量不同空间插值技术构建无线电环境图的比较
Pub Date : 2018-05-31 DOI: 10.14257/IJFGCN.2018.11.3.03
K. B. Reddy, P. Venkatramana
{"title":"Comparison of Different Spatial Interpolation Techniques of Field Measurements to Construct Radio Environment Map","authors":"K. B. Reddy, P. Venkatramana","doi":"10.14257/IJFGCN.2018.11.3.03","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.3.03","url":null,"abstract":"","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75379373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fade Margin Estimations for Malaysian Armed Forces Military X-Band Satellite Communication Links 马来西亚武装部队军用x波段卫星通信链路的衰减余量估计
Pub Date : 2018-05-31 DOI: 10.14257/IJFGCN.2018.11.3.01
A. '. Abdullah, A. F. Ismail, K. Badron, W. Hashim
The satellite communication (satcom) operating in X-band frequencies has the potential to enhance communication capabilities of Malaysian Armed Forces (MAF) and the Malaysian National Security Council (NSC). The satcom can be deployed during catastrophic instances, crisis incidences and certainly for the use of military operations. The satcom can facilitate the delivery of critical high-speed data, voice and video services between military bases, headquarters and also military detachments. The paper highlights the predicted fade margin requirements by the Malaysian Military satellite communication in order to accomplish specific operational quality of services (QoS). This is of utmost importance considering that both the uplink and the downlink will be facing severe rain attenuation due to copious heavy rainfall events, typically endured by tropical region countries. A prediction technique, recommendation ITU-R P. 618-12 with value proposed by ITU-R P. 637-6 had been employed in order to generate the desired results. Local data acquired from the Department of Irrigation and Drainage Malaysia had also been utilized in the generation of the fade margin estimations. The findings from the studies can offer insight of how to ensure/ enhance the satellite communication links reliability.
在x波段频率上运行的卫星通信(satcom)具有增强马来西亚武装部队(MAF)和马来西亚国家安全委员会(NSC)通信能力的潜力。卫星通信可以在灾难性事件、危机事件中部署,当然也可以用于军事行动。卫星通信可以促进在军事基地、总部和军事分队之间提供关键的高速数据、语音和视频服务。本文强调了马来西亚军用卫星通信预测的衰落裕度要求,以实现特定的业务服务质量(QoS)。考虑到上行链路和下行链路都将面临严重的降雨衰减,这一点至关重要,因为大量的强降雨事件通常是在热带地区国家发生的。为了产生预期的结果,采用了一种预测技术,即ITU-R P. 618-12建议,其值由ITU-R P. 637- 36提出。从马来西亚灌溉和排水部获得的当地数据也被用于产生褪色边界估计。研究结果可以为如何确保/提高卫星通信链路的可靠性提供见解。
{"title":"Fade Margin Estimations for Malaysian Armed Forces Military X-Band Satellite Communication Links","authors":"A. '. Abdullah, A. F. Ismail, K. Badron, W. Hashim","doi":"10.14257/IJFGCN.2018.11.3.01","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.3.01","url":null,"abstract":"The satellite communication (satcom) operating in X-band frequencies has the potential to enhance communication capabilities of Malaysian Armed Forces (MAF) and the Malaysian National Security Council (NSC). The satcom can be deployed during catastrophic instances, crisis incidences and certainly for the use of military operations. The satcom can facilitate the delivery of critical high-speed data, voice and video services between military bases, headquarters and also military detachments. The paper highlights the predicted fade margin requirements by the Malaysian Military satellite communication in order to accomplish specific operational quality of services (QoS). This is of utmost importance considering that both the uplink and the downlink will be facing severe rain attenuation due to copious heavy rainfall events, typically endured by tropical region countries. A prediction technique, recommendation ITU-R P. 618-12 with value proposed by ITU-R P. 637-6 had been employed in order to generate the desired results. Local data acquired from the Department of Irrigation and Drainage Malaysia had also been utilized in the generation of the fade margin estimations. The findings from the studies can offer insight of how to ensure/ enhance the satellite communication links reliability.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83534829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On The Feasibility of Polar Code as Channel Code Candidate for the 5G-IoT Scenarios 极性码作为5G-IoT场景信道候选码的可行性研究
Pub Date : 2018-05-31 DOI: 10.14257/IJFGCN.2018.11.3.02
Arti Sharma, M. Salim
5G is on the horizon and internet of things (IoT) is anticipated as an eminent scenario for the 5G network paradigm. The emerging 5G-IoT scenarios are required to potentially support and encourage the massive number of devices of low cost, low latency, long battery life with high reliability. IoT is envisioned to have billions of simultaneous connections over next few years that will completely change the characteristics of mobile network. M2M communication is prime enabling technology of the IoT which is much related to the 5G’s Machine type Communication (MTC). Therefore, 5G’s machine type Communication between massive numbers of devices with mission critical services is become very popular now days and named as 5G-IoT scenario. Channel Coding for the 5G-IoT scenarios is facing novel challenges as to support its various requirements on latency, reliability, scalability and energy consumption. Hence, an FEC code needs to endorse diverse requirements of code lengths and rates, as well as high throughput with low decoding complexity. This paper compares various candidate channel coding methods for 5G-IoT scenario. Polar code is believed as dominant advancement in channel coding theory and guarantees for apical performance. And hence, polar code is considered as promising candidate for the 5G-IoT scenario. This paper put an emphasis on the suitability of polar codes for 5G-IoT scenario.
5G即将到来,物联网(IoT)预计将成为5G网络范式的重要场景。新兴的5G-IoT场景需要潜在地支持和鼓励大量低成本、低延迟、长电池寿命和高可靠性的设备。物联网预计将在未来几年内拥有数十亿个同时连接,这将彻底改变移动网络的特征。M2M通信是物联网的主要使能技术,与5G的机器类型通信(MTC)密切相关。因此,5G的机器型通信在具有关键任务服务的大量设备之间变得非常流行,并被命名为5G- iot场景。5G-IoT场景的信道编码正面临着新的挑战,以支持其在延迟、可靠性、可扩展性和能耗方面的各种需求。因此,FEC代码需要支持对代码长度和速率的不同要求,以及具有低解码复杂性的高吞吐量。本文比较了5G-IoT场景下的各种候选信道编码方法。极性码被认为是信道编码理论的主要进步,是信道性能的保证。因此,极性代码被认为是5G-IoT场景的有希望的候选者。本文重点讨论了极性码在5G-IoT场景中的适用性。
{"title":"On The Feasibility of Polar Code as Channel Code Candidate for the 5G-IoT Scenarios","authors":"Arti Sharma, M. Salim","doi":"10.14257/IJFGCN.2018.11.3.02","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.3.02","url":null,"abstract":"5G is on the horizon and internet of things (IoT) is anticipated as an eminent scenario for the 5G network paradigm. The emerging 5G-IoT scenarios are required to potentially support and encourage the massive number of devices of low cost, low latency, long battery life with high reliability. IoT is envisioned to have billions of simultaneous connections over next few years that will completely change the characteristics of mobile network. M2M communication is prime enabling technology of the IoT which is much related to the 5G’s Machine type Communication (MTC). Therefore, 5G’s machine type Communication between massive numbers of devices with mission critical services is become very popular now days and named as 5G-IoT scenario. Channel Coding for the 5G-IoT scenarios is facing novel challenges as to support its various requirements on latency, reliability, scalability and energy consumption. Hence, an FEC code needs to endorse diverse requirements of code lengths and rates, as well as high throughput with low decoding complexity. This paper compares various candidate channel coding methods for 5G-IoT scenario. Polar code is believed as dominant advancement in channel coding theory and guarantees for apical performance. And hence, polar code is considered as promising candidate for the 5G-IoT scenario. This paper put an emphasis on the suitability of polar codes for 5G-IoT scenario.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81264496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Device Fingerprint and Mobile Agent based Authentication Technique in Wireless Networks 无线网络中基于设备指纹和移动代理的认证技术
Pub Date : 2018-05-31 DOI: 10.14257/IJFGCN.2018.11.3.04
Umesh Kumar, S. Gambhir
Mobile agent technology is continuously evolving and generating lot of attention among researchers. This paper proposes a new authentication algorithm by using mobile agent technology. The proposed algorithm uses device signature based mechanism for authentication of the device on mobile agent based framework. Device features have been extracted for some specific values and from these features the device fingerprint is generated for the authentication. Research paper describes the device fingerprint extraction, registration and authentication algorithm. As the traffic on the internet is growing at a rapid rate, there is also the need of a technique to reduce the traffic on the internet. Comparison analysis of the proposed algorithm and comparison with the traditional client server based mechanism is done in terms of network traffic. The proposed algorithm reduces the traffic around the authenticator to a great extent as compared to the client server based mechanism. It can also be useful against various attacks in wireless networks, like man in the middle or fake access point etc.
移动代理技术正在不断发展,并引起了研究人员的广泛关注。本文利用移动代理技术提出了一种新的身份认证算法。该算法在基于移动代理的框架上采用基于设备签名的机制对设备进行认证。已经提取了一些特定值的设备特征,并从这些特征中生成用于身份验证的设备指纹。研究论文介绍了设备指纹的提取、注册和认证算法。随着互联网上的流量快速增长,也需要一种技术来减少互联网上的流量。从网络流量的角度对该算法进行了比较分析,并与传统的基于客户端服务器的机制进行了比较。与基于客户端服务器的机制相比,该算法在很大程度上减少了身份验证器周围的流量。它也可以用来对付无线网络中的各种攻击,比如中间人或假接入点等。
{"title":"Device Fingerprint and Mobile Agent based Authentication Technique in Wireless Networks","authors":"Umesh Kumar, S. Gambhir","doi":"10.14257/IJFGCN.2018.11.3.04","DOIUrl":"https://doi.org/10.14257/IJFGCN.2018.11.3.04","url":null,"abstract":"Mobile agent technology is continuously evolving and generating lot of attention among researchers. This paper proposes a new authentication algorithm by using mobile agent technology. The proposed algorithm uses device signature based mechanism for authentication of the device on mobile agent based framework. Device features have been extracted for some specific values and from these features the device fingerprint is generated for the authentication. Research paper describes the device fingerprint extraction, registration and authentication algorithm. As the traffic on the internet is growing at a rapid rate, there is also the need of a technique to reduce the traffic on the internet. Comparison analysis of the proposed algorithm and comparison with the traditional client server based mechanism is done in terms of network traffic. The proposed algorithm reduces the traffic around the authenticator to a great extent as compared to the client server based mechanism. It can also be useful against various attacks in wireless networks, like man in the middle or fake access point etc.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74280961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two Mechanisms of Packet Dropout Compensation for Linear Filter of Networked Control Systems 网络控制系统线性滤波器的两种丢包补偿机制
Pub Date : 2016-11-30 DOI: 10.14257/ijfgcn.2016.9.11.04
Hao Jin, Jing Ma
This paper studies the optimal linear filtering problem for networked control systems (NCSs) with multiple packet dropouts. When the current measurement is lost, the two popular compensation mechanisms (the hold-input and zero-input mechanism) are used for compensation, respectively. The hold-input strategy means that the latest measurements received is applied directly whereas the zero-input one adopts zero value. Based on the two popular compensators, the optimal linear filters in the linear minimum variance sense are given by innovation analysis approach, and their performances are compared in terms of two simulation examples. The conclusion is that neither of the two compensation mechanisms can be claimed to be superior to the other.
研究了具有多个丢包的网络控制系统的最优线性滤波问题。当电流测量丢失时,分别使用两种常用的补偿机制(保持输入和零输入机制)进行补偿。保持输入策略意味着直接应用接收到的最新测量值,而零输入策略则采用零值。在这两种常用补偿器的基础上,采用创新分析方法给出了线性最小方差意义下的最优线性滤波器,并通过两个仿真实例对其性能进行了比较。结论是,这两种补偿机制都不能声称孰优孰劣。
{"title":"Two Mechanisms of Packet Dropout Compensation for Linear Filter of Networked Control Systems","authors":"Hao Jin, Jing Ma","doi":"10.14257/ijfgcn.2016.9.11.04","DOIUrl":"https://doi.org/10.14257/ijfgcn.2016.9.11.04","url":null,"abstract":"This paper studies the optimal linear filtering problem for networked control systems (NCSs) with multiple packet dropouts. When the current measurement is lost, the two popular compensation mechanisms (the hold-input and zero-input mechanism) are used for compensation, respectively. The hold-input strategy means that the latest measurements received is applied directly whereas the zero-input one adopts zero value. Based on the two popular compensators, the optimal linear filters in the linear minimum variance sense are given by innovation analysis approach, and their performances are compared in terms of two simulation examples. The conclusion is that neither of the two compensation mechanisms can be claimed to be superior to the other.","PeriodicalId":45234,"journal":{"name":"International Journal of Future Generation Communication and Networking","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66979646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Future Generation Communication and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1