Machine learning now confronts two significant obstacles: the first is data isolation in most organizations' silos, and the second is data privacy and security enforcement. The widespread application of Machine Learning techniques in patient care is currently hampered by limited dataset availability for algorithm training and validation due to the lack of standardised electronic medical records and strict legal and ethical requirements to protect patient privacy. To avoid compromising patient privacy while supporting scientific analysis on massive datasets to improve patient care, it is necessary to analyse and implement Machine Learning solutions that fulfil data security and consumption demands. In this survey paper, we meticulously explain the existing works of federated learning from many perspectives to give a thorough overview and promote future research in this area. Then, we determine the current challenges, attack vectors and potential prospects for federated learning research. We analysed the similarities, differences and advantages between federated learning and other machine learning techniques. We also discussed about system and statistical heterogeneity and related efficient algorithms.
{"title":"Survey: An Overview on Privacy Preserving Federated Learning in Health Data","authors":"Manzur Elahi, Hui Cui, Mohammed Kaosar","doi":"10.37256/cnc.1120231992","DOIUrl":"https://doi.org/10.37256/cnc.1120231992","url":null,"abstract":"Machine learning now confronts two significant obstacles: the first is data isolation in most organizations' silos, and the second is data privacy and security enforcement. The widespread application of Machine Learning techniques in patient care is currently hampered by limited dataset availability for algorithm training and validation due to the lack of standardised electronic medical records and strict legal and ethical requirements to protect patient privacy. To avoid compromising patient privacy while supporting scientific analysis on massive datasets to improve patient care, it is necessary to analyse and implement Machine Learning solutions that fulfil data security and consumption demands. In this survey paper, we meticulously explain the existing works of federated learning from many perspectives to give a thorough overview and promote future research in this area. Then, we determine the current challenges, attack vectors and potential prospects for federated learning research. We analysed the similarities, differences and advantages between federated learning and other machine learning techniques. We also discussed about system and statistical heterogeneity and related efficient algorithms.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"20 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77199392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianhe Du, K. Ahn, Mohamed M. G. Farag, Hesham A Rakha
As communication technology is developing at a rapid pace, connected vehicles (CVs) can potentially enhance vehicle safety while reducing vehicle energy consumption and emissions via data sharing. Many researchers have attempted to quantify the impacts of such CV applications and vehicle-to-everything (V2X) communication, or the instant and accurate communication among vehicles, devices, pedestrians, infrastructure, network, cloud, and grid. Cellular V2X (C-V2X) has gained interest as an efficient method for this data sharing. In releases 14 and 15, C-V2X uses 4G LTE technology, and in release 16, it uses the latest 5G new radio (NR) technology. Among its benefits, C-V2X can function even with no network infrastructure coverage; in addition, C-V2X surpasses older technologies in terms of communication range, latency, and data rates. Highly efficient information interchange in a CV environment can provide timely data to enhance the transportation system's capacity, and it can support applications that improve vehicle safety and minimize negative impacts on the environment. Achieving the full benefits of CVs requires rigorous investigation into the effectiveness, strengths, and weaknesses of different CV applications. It also calls for deeper understanding of the communication protocols, results with different CV market penetration rates (MPRs), CV- and human-driven vehicle interactions, integration of multiple applications, and errors and latencies associated with data communication. This paper includes a review of existing literature on the safety, mobility, and environmental impacts of CV applications; gaps in current CV research; and recommended directions for future research. The results of this paper will help shape future research for CV applications to realize their full potential.
{"title":"Impacts of Vehicle-to-Everything Enabled Applications: Literature Review of Existing Studies","authors":"Jianhe Du, K. Ahn, Mohamed M. G. Farag, Hesham A Rakha","doi":"10.37256/cnc.1120232115","DOIUrl":"https://doi.org/10.37256/cnc.1120232115","url":null,"abstract":"As communication technology is developing at a rapid pace, connected vehicles (CVs) can potentially enhance vehicle safety while reducing vehicle energy consumption and emissions via data sharing. Many researchers have attempted to quantify the impacts of such CV applications and vehicle-to-everything (V2X) communication, or the instant and accurate communication among vehicles, devices, pedestrians, infrastructure, network, cloud, and grid. Cellular V2X (C-V2X) has gained interest as an efficient method for this data sharing. In releases 14 and 15, C-V2X uses 4G LTE technology, and in release 16, it uses the latest 5G new radio (NR) technology. Among its benefits, C-V2X can function even with no network infrastructure coverage; in addition, C-V2X surpasses older technologies in terms of communication range, latency, and data rates. Highly efficient information interchange in a CV environment can provide timely data to enhance the transportation system's capacity, and it can support applications that improve vehicle safety and minimize negative impacts on the environment. Achieving the full benefits of CVs requires rigorous investigation into the effectiveness, strengths, and weaknesses of different CV applications. It also calls for deeper understanding of the communication protocols, results with different CV market penetration rates (MPRs), CV- and human-driven vehicle interactions, integration of multiple applications, and errors and latencies associated with data communication. This paper includes a review of existing literature on the safety, mobility, and environmental impacts of CV applications; gaps in current CV research; and recommended directions for future research. The results of this paper will help shape future research for CV applications to realize their full potential.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"265 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80098116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The centralized joint access point (AP) association and radio resource allocation problem in time-sharing based dense WLANs with heterogeneous station (STA) throughput demands and identical AP transmission power is considered in this paper. The problem is formulated as an NP-hard single non-zero programming (SNZP) optimization problem with three different throughput-based objective functions, including the maximal aggregate (MA) throughput, the max-min fair (MMF) throughput and the proportionally fair (PF) throughput. To solve the NP-hard SNZP problem, based on the optimal branch-and-bound (BnB) searching approach, two novel efficient algorithms, the optimal BnB and the suboptimal depth-first BnB (DF-BnB) algorithms, are proposed, which can be used as convenient performance benchmarks in the study of the problem considered. The complexity of the proposed algorithms is analyzed theoretically. Numerical results are presented to investigate and compare the performance and complexity of the proposed algorithms under the three different design criteria, which can help in choosing an appropriate cost function objective in practical system design.
{"title":"Efficient Optimal and Suboptimal Joint Access Point Association and Radio Resource Allocation in WLANs","authors":"Zhiwei Mao","doi":"10.37256/cnc.1120231689","DOIUrl":"https://doi.org/10.37256/cnc.1120231689","url":null,"abstract":"The centralized joint access point (AP) association and radio resource allocation problem in time-sharing based dense WLANs with heterogeneous station (STA) throughput demands and identical AP transmission power is considered in this paper. The problem is formulated as an NP-hard single non-zero programming (SNZP) optimization problem with three different throughput-based objective functions, including the maximal aggregate (MA) throughput, the max-min fair (MMF) throughput and the proportionally fair (PF) throughput. To solve the NP-hard SNZP problem, based on the optimal branch-and-bound (BnB) searching approach, two novel efficient algorithms, the optimal BnB and the suboptimal depth-first BnB (DF-BnB) algorithms, are proposed, which can be used as convenient performance benchmarks in the study of the problem considered. The complexity of the proposed algorithms is analyzed theoretically. Numerical results are presented to investigate and compare the performance and complexity of the proposed algorithms under the three different design criteria, which can help in choosing an appropriate cost function objective in practical system design.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"12 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74827696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet.
{"title":"High Altitude Platform Stations Aided Cloud-Computing Solution for Rural-Environment IoT Applications","authors":"Victor Monzon Baeza, Manuel Alvarez Marban","doi":"10.37256/cnc.1120232107","DOIUrl":"https://doi.org/10.37256/cnc.1120232107","url":null,"abstract":"This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"203 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86999581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The focus of this work is on minimizing the time average of the weighted sum of the Age-of-Information in a multi-sensor system in the setting where all sensors report their measurements to a central monitoring station using a shared communication channel. We consider multiple information settings including complete CSI/delayed CSI/no CSI and two stochastic channel evolution models, i.e., i.i.d. channels and Markovian channels. In all settings considered, we prove the indexability of the scheduling problem. In addition, we compute the Whittle Index in closed form for some of the settings. Indexability for Markovian channels for the objective of minimizing AoI is a key contribution of this work. Further, under i.i.d. channels, we propose a novel efficient implementation for the Whittle Index-based policy. We use simulations to show that Whittle Index-based scheduling policies either outperform or match the performance of the state-of-the-art policies for all the settings considered.
{"title":"Whittle Index Based Age-of-Information Aware Scheduling for Markovian Channels","authors":"Bejjipuram Sombabu, Bhishma Dedhia, Sharayu Moharir","doi":"10.37256/cnc.1120231701","DOIUrl":"https://doi.org/10.37256/cnc.1120231701","url":null,"abstract":"The focus of this work is on minimizing the time average of the weighted sum of the Age-of-Information in a multi-sensor system in the setting where all sensors report their measurements to a central monitoring station using a shared communication channel. We consider multiple information settings including complete CSI/delayed CSI/no CSI and two stochastic channel evolution models, i.e., i.i.d. channels and Markovian channels. In all settings considered, we prove the indexability of the scheduling problem. In addition, we compute the Whittle Index in closed form for some of the settings. Indexability for Markovian channels for the objective of minimizing AoI is a key contribution of this work. Further, under i.i.d. channels, we propose a novel efficient implementation for the Whittle Index-based policy. We use simulations to show that Whittle Index-based scheduling policies either outperform or match the performance of the state-of-the-art policies for all the settings considered.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"31 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80406561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Han, Alvaro Retana, Cedric Westphal, Richard Li
This document analyses the problems and challenges of addressing and routing to Low Earth Orbit (LEO) satellites used for the future Internet. It focuses on the scenario where Inter-Satellite-Links (ISL) are used for massive LEO satellite constellation. Such LEO satellite network is the key to the Non-terrestrial Network (NTN) integration with 5G and beyond. The paper describes two categories of solutions. One is based on IPv6 and another is based on a new protocol, New IP. The two categories of solutions are a) using new types of addresses for LEO satellites and b) new concepts for routing with these addresses. The semantic addressing scheme leverages the characteristics of satellites with known orbit elements; and simplifies the satellite identification by using limited indexes. The routing method combines semantic addressing with source routing and generates a new semantic routing scheme. Compared with traditional methods, the new proposals dramatically reduce the workload in satellite, such as table size, Ternary Content-addressable memory (TCAM) lookups, and packet header size. Thus it is more suitable to networks in space where the harsh environment limits the hardware performance, power consumption, link bandwidth and system complexity.
{"title":"Large Scale LEO Satellite Networks for the Future Internet: Challenges and Solutions to Addressing and Routing","authors":"Lin Han, Alvaro Retana, Cedric Westphal, Richard Li","doi":"10.37256/cnc.1120232105","DOIUrl":"https://doi.org/10.37256/cnc.1120232105","url":null,"abstract":"This document analyses the problems and challenges of addressing and routing to Low Earth Orbit (LEO) satellites used for the future Internet. It focuses on the scenario where Inter-Satellite-Links (ISL) are used for massive LEO satellite constellation. Such LEO satellite network is the key to the Non-terrestrial Network (NTN) integration with 5G and beyond. The paper describes two categories of solutions. One is based on IPv6 and another is based on a new protocol, New IP. The two categories of solutions are a) using new types of addresses for LEO satellites and b) new concepts for routing with these addresses. The semantic addressing scheme leverages the characteristics of satellites with known orbit elements; and simplifies the satellite identification by using limited indexes. The routing method combines semantic addressing with source routing and generates a new semantic routing scheme. Compared with traditional methods, the new proposals dramatically reduce the workload in satellite, such as table size, Ternary Content-addressable memory (TCAM) lookups, and packet header size. Thus it is more suitable to networks in space where the harsh environment limits the hardware performance, power consumption, link bandwidth and system complexity.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"30 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78685871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. S. C. L. Narayana, Sucheta Ravikanti, Harsh Deshpande, Sharayu Moharir
Software as a Service (SaaS) instances often use edge resources to serve their customers. The version of the service hosted at the edge needs to be periodically updated to maximize the utility derived by the customers. We focus on scheduling updates in the setting where the utility derived from a version is an unknown decreasing function of the time elapsed since the version was created. We map the scheduling problem to a multi-arm bandit and propose an update policy. We characterize its performance and compare it with the fundamental limit on the performance of any online policy.
{"title":"Scheduling Service Updates: A Multi-arm Bandit Approach","authors":"V. S. C. L. Narayana, Sucheta Ravikanti, Harsh Deshpande, Sharayu Moharir","doi":"10.37256/cnc.1120231686","DOIUrl":"https://doi.org/10.37256/cnc.1120231686","url":null,"abstract":"Software as a Service (SaaS) instances often use edge resources to serve their customers. The version of the service hosted at the edge needs to be periodically updated to maximize the utility derived by the customers. We focus on scheduling updates in the setting where the utility derived from a version is an unknown decreasing function of the time elapsed since the version was created. We map the scheduling problem to a multi-arm bandit and propose an update policy. We characterize its performance and compare it with the fundamental limit on the performance of any online policy.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"108 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75868877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado
Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.
{"title":"Long Range Based IoT Search and Rescue System, a Human-Computer Interaction Preliminary Study and Implementation","authors":"Christos Bouras, A. Gkamas, Spyridon Aniceto Katsampiris Salgado","doi":"10.37256/cnc.1120231753","DOIUrl":"https://doi.org/10.37256/cnc.1120231753","url":null,"abstract":"Nowadays, IoT has been introduced in different aspects of our lives giving solutions to several problems, one of which is the Search and Rescue (SAR) operations. People that suffer from dementia or people with disease in the autism spectrum tend to elope from their caretaker’s attention, a fact that can lead to serious problems. Thus, a system that takes into consideration of the multiple requirements is of paramount importance. In this paper, a LoRa based SAR system is proposed in order to help in the localization of people with high risk of going missing. In contrast to most of the related systems, in this research article a different approach has been followed. Instead of focusing on the technology, in our approach a human-centered design has been used, leveraging the knowledge of Human-Computer Interaction (HCI) domain. Thus, the technologies used, are an outcome of the initial study. Finally, the system is evaluated using heuristic evaluation and questionnaires.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"139 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86570100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy
The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used
大规模MIMO这个术语的意思是,大规模多输入多输出也被称为(大规模天线系统,超大型MIMO)。海量多输入多输出(Massive multi - input - multioutput, MIMO)由于其特点、构成要素和优势,是未来第五代(5G)移动无线通信网络的主要关键技术。大规模MIMO将由五大要素组成;天线,电子元件,网络架构,协议和信号处理。我们认识到预编码技术是利用信道状态信息技术(CSIT)在信号发送前对其进行操作的一种处理技术。这种技术根据CSIT的类型和性能标准而有所不同。预编码技术是发送端的最后一个数字处理模块。本文对线性和非线性预编码技术进行了综述,提出了最小均方误差(MMSE)、块对角化(BD)、Tomlinson-Harashima (TH)和脏纸编码(DPC)两种预编码技术。四种预编码技术:MMSE、BD、DPC和TH在研究中被用于单蜂窝和多蜂窝场景的功耗、能源效率和面积吞吐量。在比较所提出的技术时,就能源效率和面积吞吐量而言,当使用不完美的CSI时,重用因子(重用4)比其他技术表现更好
{"title":"Energy Efficient Linear and Non-Linear Precoders for Massive MIMO Systems","authors":"S. H. Sackey, Michael Ansong, S. N. Kofie, Abdul Karim Armahy","doi":"10.47277/ijcncs/8(8)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(8)1","url":null,"abstract":"The term Massive MIMO means, Massive multiple input multiple output also known as (large-scale antenna system, very large MIMO). Massive Multiple-Input-MultipleOutput (MIMO) is the major key technique for the future Fifth Generation (5G) of mobile wireless communication network due to its characteristics, elements and advantages. Massive MIMO will be comprised of five major elements; antennas, electronic components, network architectures, protocols and signal processing. We realize that precoding technique is a processing technique that utilizes Channel State Information Technique (CSIT) by operating on the signals before transmitting them. This technique varies base on the type of CSIT and performance criterion. Precoding technique is the last digital processing block at the transmitting side. In this paper, linear and non-linear Precoding technique was reviewed and we proposed two techniques under each that is Minimum Mean Square Error (MMSE), Block Diagonalization (BD), Tomlinson-Harashima (TH) and Dirty paper coding (DPC). Four Precoding techniques: MMSE, BD, DPC and TH were used in the studies to power consumption, energy efficiency and area throughput for single-cell and multi-cell scenarios. In comparing the proposed techniques, in terms of energy efficiency and area throughput, reuse factor (Reuse 4) performs better than other techniques when there is an imperfect CSI is used","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"59-66"},"PeriodicalIF":2.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48503049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area
{"title":"Man in the Middle Attacks: Analysis, Motivation and Prevention","authors":"D. Javeed, U. MohammedBadamasi, C. Ndubuisi, F. Soomro, M. Asif","doi":"10.47277/ijcncs/8(7)1","DOIUrl":"https://doi.org/10.47277/ijcncs/8(7)1","url":null,"abstract":"Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"8 1","pages":"52-58"},"PeriodicalIF":2.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44006369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}