首页 > 最新文献

Computer Networks and Communications最新文献

英文 中文
Analysis of Path Convergence in Chord DHT 和弦 DHT 的路径收敛分析
Pub Date : 2024-07-25 DOI: 10.37256/cnc.2220244753
Vladimir Rocha, Daniel Czeresnia, Carlo Kleber da Silva Rodrigues
Chord is a Distributed Hash Table widely used for its efficiency in searching for information. The efficiency of this structure relies on creating short paths of O(log2 n) between two nodes, in which n is the number of nodes. To enhance efficiency, several studies use replication in the nodes belonging to the network, assuming that searches will converge in these replicated nodes. This work proposes a convergence formula and analyzes the number of searches converging on nodes for different network sizes (small, medium, and large), up to one million nodes. The experiments show that the convergence creates three zones and the results support the replication techniques from previous studies and demonstrate that it is feasible to replicate in nodes that were not considered in these studies.
Chord 是一种分布式散列表,因其搜索信息的效率高而被广泛使用。这种结构的效率依赖于在两个节点之间创建 O(log2 n)的短路径,其中 n 是节点数。为了提高效率,一些研究在属于网络的节点中使用了复制,假设搜索会在这些复制节点中收敛。这项工作提出了一个收敛公式,并分析了不同网络规模(小型、中型和大型)(最高达一百万个节点)的节点上收敛的搜索次数。实验表明,收敛会产生三个区域,结果支持了之前研究中的复制技术,并证明在这些研究未考虑的节点上复制是可行的。
{"title":"Analysis of Path Convergence in Chord DHT","authors":"Vladimir Rocha, Daniel Czeresnia, Carlo Kleber da Silva Rodrigues","doi":"10.37256/cnc.2220244753","DOIUrl":"https://doi.org/10.37256/cnc.2220244753","url":null,"abstract":"Chord is a Distributed Hash Table widely used for its efficiency in searching for information. The efficiency of this structure relies on creating short paths of O(log2 n) between two nodes, in which n is the number of nodes. To enhance efficiency, several studies use replication in the nodes belonging to the network, assuming that searches will converge in these replicated nodes. This work proposes a convergence formula and analyzes the number of searches converging on nodes for different network sizes (small, medium, and large), up to one million nodes. The experiments show that the convergence creates three zones and the results support the replication techniques from previous studies and demonstrate that it is feasible to replicate in nodes that were not considered in these studies.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"38 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Cloud Resource Allocation in Federated Environments through Outsourcing Strategies 通过外包策略优化联盟环境中的云资源分配
Pub Date : 2024-07-08 DOI: 10.37256/cnc.2220244747
Arash Mazidi
Cloud computing enables users to access required resources, with the invention of high-end devices leading to exponential increases in cloud resource requests. This poses significant challenges for resource management due to the scale of the cloud and unpredictable user demands. This paper presents an approach to managing resources during peak request periods for virtual machines (VMs) by leveraging cloud federation, outsourcing requests to other federation members. An algorithm is proposed to initiate cloud federation and allocate customer requests within it. The primary objectives are to increase the profit of cloud providers and improve resource utilization. An ensemble algorithm maximizes profit using both the proposed algorithm and three established ones. Experimental results demonstrate that our method outperforms existing approaches in profit, resource utilization, and rejected requests in most scenarios.
云计算使用户能够访问所需资源,而高端设备的发明导致云资源请求呈指数级增长。由于云的规模和不可预测的用户需求,这给资源管理带来了巨大挑战。本文提出了一种在虚拟机(VM)请求高峰期管理资源的方法,即利用云联盟,将请求外包给其他联盟成员。本文提出了一种启动云联盟并在其中分配客户请求的算法。主要目标是增加云提供商的利润并提高资源利用率。一种集合算法利用所提出的算法和三种现有算法实现利润最大化。实验结果表明,在大多数情况下,我们的方法在利润、资源利用率和拒绝请求方面都优于现有方法。
{"title":"Optimizing Cloud Resource Allocation in Federated Environments through Outsourcing Strategies","authors":"Arash Mazidi","doi":"10.37256/cnc.2220244747","DOIUrl":"https://doi.org/10.37256/cnc.2220244747","url":null,"abstract":"Cloud computing enables users to access required resources, with the invention of high-end devices leading to exponential increases in cloud resource requests. This poses significant challenges for resource management due to the scale of the cloud and unpredictable user demands. This paper presents an approach to managing resources during peak request periods for virtual machines (VMs) by leveraging cloud federation, outsourcing requests to other federation members. An algorithm is proposed to initiate cloud federation and allocate customer requests within it. The primary objectives are to increase the profit of cloud providers and improve resource utilization. An ensemble algorithm maximizes profit using both the proposed algorithm and three established ones. Experimental results demonstrate that our method outperforms existing approaches in profit, resource utilization, and rejected requests in most scenarios.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"105 51","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141667034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeAuth: A Decentralized Authentication and Authorization Scheme for Secure Private Data Sharing DeAuth:用于安全私人数据共享的去中心化认证和授权方案
Pub Date : 2024-07-05 DOI: 10.37256/cnc.2220244281
Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo
The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological, operational, and legal obstacles. Present solutions and their accompanying infrastructures rely on centralized models that are susceptible to hacking and can hinder data control by the rightful owner. Consequently, blockchain technology has generated interest in the fields of identity and access control. This technology is viewed as a potential solution due to its ability to offer decentralization, transparency, provenance, security, and privacy benefits. Nevertheless, a completely decentralized and private solution that enables data owners to control their private data has yet to be presented. In this research, we introduce DeAuth, a novel decentralized, authentication and authorization scheme for secure private data transfer. DeAuth combines blockchain, smart-contracts, decentralized identity, and distributed peer-to-peer (P2P) storage to give users more control of their private data, and permissioning power to share without centralized services. For this scheme, identity is proven using decentralized identifiers and verifiable credentials, while authorization to share data is performed using the blockchain. A prototype was developed using the Ethereum Blockchain and the InterPlanetary Files System, a P2P file sharing protocol. We evaluated DeAuth through a use-case study and metrics such as security, performance, and cost. Our findings indicate DeAuth to be viable alternative to using centralized services; however, the underlying technologies are still in its infancies and require more testing before it can supplant traditional services.
共享私人信息是一项艰巨、多层面和昂贵的工作。此外,身份管理也是一项额外的挑战,在技术、操作和法律方面都存在重大障碍。目前的解决方案及其配套基础设施依赖于中心化模式,容易受到黑客攻击,并可能妨碍合法所有人对数据的控制。因此,区块链技术在身份识别和访问控制领域引起了人们的兴趣。由于该技术能够提供去中心化、透明、来源、安全和隐私等优势,因此被视为一种潜在的解决方案。然而,目前还没有一种完全去中心化的私人解决方案,能让数据所有者控制自己的私人数据。在这项研究中,我们介绍了 DeAuth,这是一种新颖的去中心化、认证和授权方案,可用于安全的私人数据传输。DeAuth 将区块链、智能合约、去中心化身份和分布式点对点(P2P)存储结合在一起,让用户对其私人数据拥有更多控制权,并有权在没有中心化服务的情况下进行共享。在该方案中,身份使用去中心化标识符和可验证凭证来证明,而共享数据的授权则使用区块链来执行。我们使用以太坊区块链和 InterPlanetary Files System(一种 P2P 文件共享协议)开发了一个原型。我们通过用例研究以及安全性、性能和成本等指标对 DeAuth 进行了评估。我们的研究结果表明,DeAuth 是使用集中式服务的可行替代方案;不过,其底层技术仍处于起步阶段,需要更多测试才能取代传统服务。
{"title":"DeAuth: A Decentralized Authentication and Authorization Scheme for Secure Private Data Sharing","authors":"Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo","doi":"10.37256/cnc.2220244281","DOIUrl":"https://doi.org/10.37256/cnc.2220244281","url":null,"abstract":"The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological, operational, and legal obstacles. Present solutions and their accompanying infrastructures rely on centralized models that are susceptible to hacking and can hinder data control by the rightful owner. Consequently, blockchain technology has generated interest in the fields of identity and access control. This technology is viewed as a potential solution due to its ability to offer decentralization, transparency, provenance, security, and privacy benefits. Nevertheless, a completely decentralized and private solution that enables data owners to control their private data has yet to be presented. In this research, we introduce DeAuth, a novel decentralized, authentication and authorization scheme for secure private data transfer. DeAuth combines blockchain, smart-contracts, decentralized identity, and distributed peer-to-peer (P2P) storage to give users more control of their private data, and permissioning power to share without centralized services. For this scheme, identity is proven using decentralized identifiers and verifiable credentials, while authorization to share data is performed using the blockchain. A prototype was developed using the Ethereum Blockchain and the InterPlanetary Files System, a P2P file sharing protocol. We evaluated DeAuth through a use-case study and metrics such as security, performance, and cost. Our findings indicate DeAuth to be viable alternative to using centralized services; however, the underlying technologies are still in its infancies and require more testing before it can supplant traditional services.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":" 28","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FaceLite: A Real-Time Light-Weight Facemask Detection Using Deep Learning: A Comprehensive Analysis, Opportunities, and Challenges for Edge Computing FaceLite:使用深度学习的实时轻量面罩检测:边缘计算的全面分析、机遇与挑战
Pub Date : 2024-05-13 DOI: 10.37256/cnc.2120244439
Anup Kumar Paul
The edge computing devices running models based on deep learning have drawn a lot of interest as a prominent way of handling various applications based on AI. Due to limited memory and computing resources, it is still difficult to deploy deep learning models on edge devices in a production context with effective inference. This study examines the deployment of a lightweight facemask detection model on edge devices with real-time inference. The proposed framework uses a dual-stage convolutional neural network (CNN) architecture with two main modules that use Caffe-DNN for face detection and a proposed model based on CNN architecture or customized models based on transfer learning (e.g., MobileNet-v2, resNet50, denseNet121, NASNetMobile, Inception-v3, and XceptionNet) for facemask classification. The study does numerous analyses based on the models' performance in terms of accuracy, precision, recall, and F1-score and compares all models with low disk size and good accuracy as the main priorities for memory-constrained edge devices. The proposed CNN model for facemask detection outperforms other state-of-the-art models in terms of accuracy, achieving 99%, 99%, and 99% on the training, validation, and testing, respectively, with the facemask detection ~12K image datasets available on Kaggle. This accuracy is comparable to other transfer learning-based models, and it also achieves the smallest number of total trainable parameters and, thus, the smallest disk size of all models.
运行基于深度学习模型的边缘计算设备作为处理基于人工智能的各种应用的重要方式,引起了人们的广泛兴趣。由于内存和计算资源有限,在生产环境中将深度学习模型部署到边缘设备上并进行有效推理仍然很困难。本研究探讨了在边缘设备上部署具有实时推理功能的轻量级面罩检测模型。提议的框架使用双级卷积神经网络(CNN)架构,其中两个主要模块使用 Caffe-DNN 进行人脸检测,另一个是基于 CNN 架构的提议模型或基于迁移学习的定制模型(如 MobileNet-v2、resNet50、denseNet121、NASNetMobile、Inception-v3 和 XceptionNet)进行面罩分类。研究根据模型在准确度、精确度、召回率和 F1 分数方面的表现进行了大量分析,并对所有模型进行了比较,认为对于内存受限的边缘设备来说,磁盘容量小和准确度高是主要优先考虑的因素。针对面罩检测提出的 CNN 模型在准确率方面优于其他最先进的模型,在 Kaggle 上提供的面罩检测 ~12K 图像数据集的训练、验证和测试中分别达到了 99%、99% 和 99%。这一准确率可与其他基于迁移学习的模型相媲美,而且在所有模型中,它的可训练参数总数最少,因此磁盘大小也最小。
{"title":"FaceLite: A Real-Time Light-Weight Facemask Detection Using Deep Learning: A Comprehensive Analysis, Opportunities, and Challenges for Edge Computing","authors":"Anup Kumar Paul","doi":"10.37256/cnc.2120244439","DOIUrl":"https://doi.org/10.37256/cnc.2120244439","url":null,"abstract":"The edge computing devices running models based on deep learning have drawn a lot of interest as a prominent way of handling various applications based on AI. Due to limited memory and computing resources, it is still difficult to deploy deep learning models on edge devices in a production context with effective inference. This study examines the deployment of a lightweight facemask detection model on edge devices with real-time inference. The proposed framework uses a dual-stage convolutional neural network (CNN) architecture with two main modules that use Caffe-DNN for face detection and a proposed model based on CNN architecture or customized models based on transfer learning (e.g., MobileNet-v2, resNet50, denseNet121, NASNetMobile, Inception-v3, and XceptionNet) for facemask classification. The study does numerous analyses based on the models' performance in terms of accuracy, precision, recall, and F1-score and compares all models with low disk size and good accuracy as the main priorities for memory-constrained edge devices. The proposed CNN model for facemask detection outperforms other state-of-the-art models in terms of accuracy, achieving 99%, 99%, and 99% on the training, validation, and testing, respectively, with the facemask detection ~12K image datasets available on Kaggle. This accuracy is comparable to other transfer learning-based models, and it also achieves the smallest number of total trainable parameters and, thus, the smallest disk size of all models.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"62 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model 双向中继网络模型中计算与前向中继的信道预编码
Pub Date : 2024-03-29 DOI: 10.37256/cnc.2120244057
Jeyalakshmi Vijayarajan, S. T. Selvi
Physical layer Network Coding (PNC) is a promising strategy to improve the spectral efficiency in a relay-based wireless transmission. This paper employs lattice-based channel coding at the source nodes for better performance during Multiple Access Channel (MAC) phase transmission. The achievable transmission rate in various PNC relaying such as Decode and Forward (DF), Amplify and Forward (AF), and Compute and Forward (CF) for the Two Way Relay Network model (TWRN) is derived and simulated through MATLAB software and analyzed. The analysis shows that the rate performance of CF relaying outperforms other relaying techniques in the Additive White Gaussian Noise (AWGN) channel, but it degrades for the Rayleigh fading channel. To mitigate the fading effects, channel aware precoding technique is employed at source nodes, Bit Error Rate (BER) and Symbol Error Rate (SER) performance are analyzed for CF relaying, and Monte Carlo simulations are used to demonstrate the theoretical results. Channel precoding performance of CF relaying is compared with DF relaying.
物理层网络编码(PNC)是在基于中继的无线传输中提高频谱效率的一种有前途的策略。本文在源节点采用基于网格的信道编码,以提高多路访问信道(MAC)阶段传输的性能。通过 MATLAB 软件对双向中继网络模型(TWRN)的解码和前向(DF)、放大和前向(AF)以及计算和前向(CF)等各种 PNC 中继的可实现传输速率进行了推导和仿真分析。分析表明,在加性白高斯噪声(AWGN)信道中,CF 中继的速率性能优于其他中继技术,但在瑞利衰落信道中,CF 中继的速率性能会下降。为了减轻衰落效应,在源节点采用了信道感知预编码技术,分析了 CF 中继的比特误码率(BER)和符号误码率(SER)性能,并使用蒙特卡罗模拟来证明理论结果。将 CF 中继的信道预编码性能与 DF 中继进行了比较。
{"title":"Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model","authors":"Jeyalakshmi Vijayarajan, S. T. Selvi","doi":"10.37256/cnc.2120244057","DOIUrl":"https://doi.org/10.37256/cnc.2120244057","url":null,"abstract":"Physical layer Network Coding (PNC) is a promising strategy to improve the spectral efficiency in a relay-based wireless transmission. This paper employs lattice-based channel coding at the source nodes for better performance during Multiple Access Channel (MAC) phase transmission. The achievable transmission rate in various PNC relaying such as Decode and Forward (DF), Amplify and Forward (AF), and Compute and Forward (CF) for the Two Way Relay Network model (TWRN) is derived and simulated through MATLAB software and analyzed. The analysis shows that the rate performance of CF relaying outperforms other relaying techniques in the Additive White Gaussian Noise (AWGN) channel, but it degrades for the Rayleigh fading channel. To mitigate the fading effects, channel aware precoding technique is employed at source nodes, Bit Error Rate (BER) and Symbol Error Rate (SER) performance are analyzed for CF relaying, and Monte Carlo simulations are used to demonstrate the theoretical results. Channel precoding performance of CF relaying is compared with DF relaying.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"62 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140364848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Security Assessment of Android Mobile Banking Applications 安卓移动银行应用安全评估框架
Pub Date : 2024-03-07 DOI: 10.37256/cnc.2120243929
Loïc D. Tsobdjou, Samuel Pierre, A. Quintero
Mobile banking applications make users' daily lives easier by allowing them to access banking services, such as balance inquiries and bill payments, anytime and anywhere. Since these applications manage very sensitive financial data, special attention must be paid to data security. Several works in the literature assess the security of mobile banking applications. However, we observe the lack of a widely adopted framework among researchers for assessing the security of mobile banking applications. In this paper, we propose a framework consisting of twenty-six criteria for assessing the security of Android mobile banking applications. These criteria are divided into five categories: mobile device security, data in transit, data storage, cryptographic misuse, and others. Subsequently, we evaluate the proposed framework based on predefined requirements. These requirements are no redundancy, no ambiguity, and comprehensiveness. As a case study, we assess the security of the Android mobile banking applications of seven major Canadian banks. The results show that data in transit is adequately protected by these applications.
移动银行应用程序使用户能够随时随地使用余额查询和账单支付等银行服务,从而使用户的日常生活更加便捷。由于这些应用程序管理着非常敏感的金融数据,因此必须特别注意数据安全。有几篇文献对移动银行应用的安全性进行了评估。然而,我们发现研究人员中缺乏一个广泛采用的框架来评估移动银行应用的安全性。在本文中,我们提出了一个由 26 项标准组成的框架,用于评估安卓手机银行应用程序的安全性。这些标准分为五类:移动设备安全、传输中的数据、数据存储、密码滥用和其他。随后,我们根据预定义的要求对提议的框架进行评估。这些要求包括无冗余、无歧义和全面性。作为案例研究,我们评估了加拿大七家主要银行的安卓手机银行应用程序的安全性。结果表明,这些应用程序充分保护了传输中的数据。
{"title":"A Framework for Security Assessment of Android Mobile Banking Applications","authors":"Loïc D. Tsobdjou, Samuel Pierre, A. Quintero","doi":"10.37256/cnc.2120243929","DOIUrl":"https://doi.org/10.37256/cnc.2120243929","url":null,"abstract":"\u0000Mobile banking applications make users' daily lives easier by allowing them to access banking services, such as balance inquiries and bill payments, anytime and anywhere. Since these applications manage very sensitive financial data, special attention must be paid to data security. Several works in the literature assess the security of mobile banking applications. However, we observe the lack of a widely adopted framework among researchers for assessing the security of mobile banking applications. In this paper, we propose a framework consisting of twenty-six criteria for assessing the security of Android mobile banking applications. These criteria are divided into five categories: mobile device security, data in transit, data storage, cryptographic misuse, and others. Subsequently, we evaluate the proposed framework based on predefined requirements. These requirements are no redundancy, no ambiguity, and comprehensiveness. As a case study, we assess the security of the Android mobile banking applications of seven major Canadian banks. The results show that data in transit is adequately protected by these applications.\u0000","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"20 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140259730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review 医疗保健领域可穿戴无线传感器的安全性和隐私性:系统回顾
Pub Date : 2024-02-05 DOI: 10.37256/cnc.2120243852
Ranjit Kaur, Seyed Shahrestani, Chun Ruan
Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.
可穿戴无线传感器网络(WWSN)设备被广泛应用于医疗保健领域,以监测健康数据。然而,当 WWSN 用户通过无线连接向医疗专业人员或第三方传输数据时,他们面临着隐私和安全漏洞。本文旨在找出医疗保健领域可穿戴传感器设备中尚未解决的隐私和安全挑战,尤其是以往研究忽略的方面。主要研究问题是:医疗保健领域的可穿戴传感器设备有哪些尚未解决的隐私和安全挑战,它们对用户和医疗保健专业人员有何影响?本系统性综述采用特定的关键词来搜索文献数据库中的相关出版物,包括 Google Scholar、Scopus、IEEE Xplore 和 Web of Science。系统综述和元分析首选报告项目(PRISMA)图表有助于筛选和总结所选论文。研究结果强调了可能使 WWSN 容易受到安全攻击的关键领域。研究结果探讨了云计算、雾计算、物联网 (IoT) 等领域中可穿戴传感设备的安全和隐私问题。许多研究之所以对物联网进行研究,是因为物联网在隐私和安全方面面临挑战,尤其是在处理大量数据、使用公共渠道、部署先进技术、在无线设备数量不断增加的同时管理共享策略以及保护数据免受黑客攻击等方面。这些挑战严重威胁着 WWSN 用户在基于云的环境和物联网中向医疗保健专业人员或第三方传输的健康数据的保密性、完整性和可用性,而有限的资源又加剧了这些挑战。因此,重要发现集中于物联网中尚未解决的领域。本文旨在防范针对医疗保健的网络攻击,提高用户对 WWSN 设备的采用率。
{"title":"Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review","authors":"Ranjit Kaur, Seyed Shahrestani, Chun Ruan","doi":"10.37256/cnc.2120243852","DOIUrl":"https://doi.org/10.37256/cnc.2120243852","url":null,"abstract":"Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139864557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review 医疗保健领域可穿戴无线传感器的安全性和隐私性:系统回顾
Pub Date : 2024-02-05 DOI: 10.37256/cnc.2120243852
Ranjit Kaur, Seyed Shahrestani, Chun Ruan
Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.
可穿戴无线传感器网络(WWSN)设备被广泛应用于医疗保健领域,以监测健康数据。然而,当 WWSN 用户通过无线连接向医疗专业人员或第三方传输数据时,他们面临着隐私和安全漏洞。本文旨在找出医疗保健领域可穿戴传感器设备中尚未解决的隐私和安全挑战,尤其是以往研究忽略的方面。主要研究问题是:医疗保健领域的可穿戴传感器设备有哪些尚未解决的隐私和安全挑战,它们对用户和医疗保健专业人员有何影响?本系统性综述采用特定的关键词来搜索文献数据库中的相关出版物,包括 Google Scholar、Scopus、IEEE Xplore 和 Web of Science。系统综述和元分析首选报告项目(PRISMA)图表有助于筛选和总结所选论文。研究结果强调了可能使 WWSN 容易受到安全攻击的关键领域。研究结果探讨了云计算、雾计算、物联网 (IoT) 等领域中可穿戴传感设备的安全和隐私问题。许多研究之所以对物联网进行研究,是因为物联网在隐私和安全方面面临挑战,尤其是在处理大量数据、使用公共渠道、部署先进技术、在无线设备数量不断增加的同时管理共享策略以及保护数据免受黑客攻击等方面。这些挑战严重威胁着 WWSN 用户在基于云的环境和物联网中向医疗保健专业人员或第三方传输的健康数据的保密性、完整性和可用性,而有限的资源又加剧了这些挑战。因此,重要发现集中于物联网中尚未解决的领域。本文旨在防范针对医疗保健的网络攻击,提高用户对 WWSN 设备的采用率。
{"title":"Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review","authors":"Ranjit Kaur, Seyed Shahrestani, Chun Ruan","doi":"10.37256/cnc.2120243852","DOIUrl":"https://doi.org/10.37256/cnc.2120243852","url":null,"abstract":"Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"22 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139804745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism for Efficient Media Propagation in Event-Driven Cyber-Physical Systems 事件驱动网络物理系统中的高效媒体传播机制
Pub Date : 2024-01-26 DOI: 10.37256/cnc.2120243999
Rolando Herrero
Many key applications in Cyber-Physical Systems require the transmission of speech, audio, or video. These scenarios involve the use of traditional Real-Time Communication (RTC) protocols and technologies, which cannot always be used in the context of core networks. This is particularly critical in the context of Event-Driven Architectures (EDAs), where RTC protocols require the use of complex topologies that rely on costly infrastructure. One way to avoid this is by encapsulating all media traffic in EDA protocols. However, this approach does not come without challenges. Specifically, the nature of the transport protocols causes the media to be heavily affected by application layer impairments that render their usage highly impractical. To prevent this from happening, this paper introduces a unified scheme that supports the efficient encapsulation of media traffic in EDA scenarios. This is accomplished through a mechanism that relies on a Machine Learning (ML) model that is exercised in an experimental framework.
网络物理系统中的许多关键应用都需要传输语音、音频或视频。这些应用场景需要使用传统的实时通信(RTC)协议和技术,而这些协议和技术并不总能在核心网络中使用。在事件驱动架构(EDA)中,这一点尤为重要,因为 RTC 协议需要使用依赖于昂贵基础设施的复杂拓扑结构。避免这种情况的方法之一是在 EDA 协议中封装所有媒体流量。然而,这种方法并非没有挑战。具体来说,传输协议的性质会导致媒体受到应用层损伤的严重影响,使其使用变得非常不切实际。为避免这种情况发生,本文介绍了一种统一方案,支持在 EDA 场景中对媒体流量进行有效封装。这是通过一种依赖于机器学习(ML)模型的机制来实现的,该模型在实验框架中得到了验证。
{"title":"Mechanism for Efficient Media Propagation in Event-Driven Cyber-Physical Systems","authors":"Rolando Herrero","doi":"10.37256/cnc.2120243999","DOIUrl":"https://doi.org/10.37256/cnc.2120243999","url":null,"abstract":"Many key applications in Cyber-Physical Systems require the transmission of speech, audio, or video. These scenarios involve the use of traditional Real-Time Communication (RTC) protocols and technologies, which cannot always be used in the context of core networks. This is particularly critical in the context of Event-Driven Architectures (EDAs), where RTC protocols require the use of complex topologies that rely on costly infrastructure. One way to avoid this is by encapsulating all media traffic in EDA protocols. However, this approach does not come without challenges. Specifically, the nature of the transport protocols causes the media to be heavily affected by application layer impairments that render their usage highly impractical. To prevent this from happening, this paper introduces a unified scheme that supports the efficient encapsulation of media traffic in EDA scenarios. This is accomplished through a mechanism that relies on a Machine Learning (ML) model that is exercised in an experimental framework.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"65 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139593764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Model for CM-3 Scenario Over Generalized Distribution Under Various Window Functions 各种窗口函数下广义分布的 CM-3 场景通道模型
Pub Date : 2024-01-22 DOI: 10.37256/cnc.2120244017
Shekhar Singh, S. P. Singh, L. M
In terms of fundamental research and technology development level, Wireless Body Area Network (WBAN) is a well-established paradigm of wireless system. However, like any wireless system, channel modeling of WBAN is one of the most challenging research eras. Also, literature suggests Channel Model-3, termed as CM-3 scenario based on the positioning of the Nano antenna, is one of the most useful deployment scenarios of WBAN. Further, arrival time and the number of arrivals, which plays an important role in the CM-3 scenario of WBAN, are modeled using the Poisson distribution.  However, in Poisson distribution the variance and mean are equal and the probability of success is kept fixed. Hence, the versatility of the channel model based Poisson distribution is limited due to limited parameters. On the other hand, Negative Binomial (NB) distribution with extra parameters is a more general distribution. Therefore, this manuscript employs Negative Binomial distribution to present a more general channel model under the CM-3 scenario. In addition, effects of different windowing techniques, such as Bartlett and Gaussian window, on the channel model are analyzed under both, Poisson distribution and Negative Binomial distributions.
就基础研究和技术发展水平而言,无线体域网(WBAN)是一种成熟的无线系统范例。然而,与其他无线系统一样,WBAN 的信道建模也是最具挑战性的研究领域之一。此外,文献表明,基于纳米天线定位的信道模型-3(称为 CM-3 方案)是 WBAN 最有用的部署方案之一。此外,在 WBAN 的 CM-3 方案中起重要作用的到达时间和到达次数是使用泊松分布建模的。 然而,在泊松分布中,方差和均值相等,成功概率固定不变。因此,由于参数有限,基于泊松分布的信道模型的通用性受到了限制。另一方面,带有额外参数的负二项分布(NB)是一种更通用的分布。因此,本稿件采用负二项分布来呈现 CM-3 场景下更通用的信道模型。此外,还分析了泊松分布和负二项分布下不同窗口技术(如巴特利特窗口和高斯窗口)对信道模型的影响。
{"title":"Channel Model for CM-3 Scenario Over Generalized Distribution Under Various Window Functions","authors":"Shekhar Singh, S. P. Singh, L. M","doi":"10.37256/cnc.2120244017","DOIUrl":"https://doi.org/10.37256/cnc.2120244017","url":null,"abstract":"In terms of fundamental research and technology development level, Wireless Body Area Network (WBAN) is a well-established paradigm of wireless system. However, like any wireless system, channel modeling of WBAN is one of the most challenging research eras. Also, literature suggests Channel Model-3, termed as CM-3 scenario based on the positioning of the Nano antenna, is one of the most useful deployment scenarios of WBAN. Further, arrival time and the number of arrivals, which plays an important role in the CM-3 scenario of WBAN, are modeled using the Poisson distribution.  However, in Poisson distribution the variance and mean are equal and the probability of success is kept fixed. Hence, the versatility of the channel model based Poisson distribution is limited due to limited parameters. On the other hand, Negative Binomial (NB) distribution with extra parameters is a more general distribution. Therefore, this manuscript employs Negative Binomial distribution to present a more general channel model under the CM-3 scenario. In addition, effects of different windowing techniques, such as Bartlett and Gaussian window, on the channel model are analyzed under both, Poisson distribution and Negative Binomial distributions.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"9 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1