首页 > 最新文献

Journal of High Speed Networks最新文献

英文 中文
AD-RED: A new variant of random early detection AQM algorithm AD-RED:一种新的随机早期检测AQM算法
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-10 DOI: 10.3233/jhs-222055
Samuel Hassan
Intensive continuing research has been noticed among scholars in the literature with a particular appreciable interest in developing new enhanced variants for the long-standing Random Early Detection (RED) algorithm. Contemporary trends shows that researchers continue to follow a research line thereby exchanging the linear curve needed in RED with nonlinear curves. Several reports have shown that RED’s sole linear function is insufficiently powered for managing rising degrees of traffic congestion in the network. In this paper, Amended Dropping – Random Early Detection (AD-RED), a revised version of RED is presented. AD-RED algorithm consists in combining two nonlinear packet dropping functions: quadratic plus exponential. What’s more, results from ns-3 simulator shows that AD-RED reasonably stabilized and minified the (average) queue size; and obtained a whittled down end-to-end delay when compared with RED itself and another variant of RED. Hence, AD-RED is offered as a fully sufficient replacement for RED’s algorithm implementation in routers.
学者们对长期存在的随机早期检测(RED)算法开发新的增强变体特别感兴趣,已经注意到深入的持续研究。当代趋势表明,研究人员继续遵循一条研究路线,从而将RED所需的线性曲线与非线性曲线交换。几份报告表明,RED唯一的线性功能不足以管理网络中日益严重的交通拥堵。本文提出了一种改进版的随机早期检测(drop - Random Early Detection, AD-RED)。AD-RED算法是将两个非线性丢包函数:二次加指数函数组合而成。此外,ns-3模拟器的结果表明,AD-RED合理地稳定并减小了(平均)队列大小;与RED本身和RED的另一个变体相比,得到了一个精简的端到端延迟。因此,AD-RED在路由器中完全可以替代RED的算法实现。
{"title":"AD-RED: A new variant of random early detection AQM algorithm","authors":"Samuel Hassan","doi":"10.3233/jhs-222055","DOIUrl":"https://doi.org/10.3233/jhs-222055","url":null,"abstract":"Intensive continuing research has been noticed among scholars in the literature with a particular appreciable interest in developing new enhanced variants for the long-standing Random Early Detection (RED) algorithm. Contemporary trends shows that researchers continue to follow a research line thereby exchanging the linear curve needed in RED with nonlinear curves. Several reports have shown that RED’s sole linear function is insufficiently powered for managing rising degrees of traffic congestion in the network. In this paper, Amended Dropping – Random Early Detection (AD-RED), a revised version of RED is presented. AD-RED algorithm consists in combining two nonlinear packet dropping functions: quadratic plus exponential. What’s more, results from ns-3 simulator shows that AD-RED reasonably stabilized and minified the (average) queue size; and obtained a whittled down end-to-end delay when compared with RED itself and another variant of RED. Hence, AD-RED is offered as a fully sufficient replacement for RED’s algorithm implementation in routers.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136293236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LEOCN: Real-time and complete network simulation framework for LEO constellation networks1 LEO星座网络实时、完整的网络仿真框架1
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-29 DOI: 10.3233/jhs-222061
Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He
With the development of the space industry, LEO simulation platforms are increasingly important. Prior work mainly focused on the dynamics of constellation topology, routing algorithms against the topological motion, and the behavior of LEO constellation networks, but neglected real-time and completeness properties. In our work, we design a real-time and complete network simulation framework, named LEOCN, that is more meaningful and detailed for researchers than previous work on LEO satellite constellation simulations. LEOCN is supported by Linux System, which makes the framework more realistic and relieves the computational burden. Meanwhile, LEOCN deeply considers topology and routing algorithms, visualization, satellite mobility, communication protocols, and network traffic problems. On LEOCN, we can deploy routing algorithm experiments via SDN. We evaluate the performance of LEOCN in large-scale constellation scenarios, and the results demonstrate the superiority of the real-time and complete network simulation framework.
随着航天事业的发展,低轨道仿真平台的重要性日益凸显。以往的研究工作主要集中在星座拓扑的动态特性、针对拓扑运动的路由算法以及低轨道星座网络的行为,但忽略了实时性和完备性。在我们的工作中,我们设计了一个实时完整的网络仿真框架,命名为LEOCN,这对研究人员来说比以往的LEO卫星星座仿真工作更有意义和详细。Linux系统支持LEOCN,使框架更加真实,减轻了计算负担。同时,LEOCN深入考虑了拓扑和路由算法、可视化、卫星移动性、通信协议和网络流量问题。在LEOCN上,我们可以通过SDN部署路由算法实验。在大规模星座场景下对LEOCN的性能进行了评估,结果表明了实时完整网络仿真框架的优越性。
{"title":"LEOCN: Real-time and complete network simulation framework for LEO constellation networks1","authors":"Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He","doi":"10.3233/jhs-222061","DOIUrl":"https://doi.org/10.3233/jhs-222061","url":null,"abstract":"With the development of the space industry, LEO simulation platforms are increasingly important. Prior work mainly focused on the dynamics of constellation topology, routing algorithms against the topological motion, and the behavior of LEO constellation networks, but neglected real-time and completeness properties. In our work, we design a real-time and complete network simulation framework, named LEOCN, that is more meaningful and detailed for researchers than previous work on LEO satellite constellation simulations. LEOCN is supported by Linux System, which makes the framework more realistic and relieves the computational burden. Meanwhile, LEOCN deeply considers topology and routing algorithms, visualization, satellite mobility, communication protocols, and network traffic problems. On LEOCN, we can deploy routing algorithm experiments via SDN. We evaluate the performance of LEOCN in large-scale constellation scenarios, and the results demonstrate the superiority of the real-time and complete network simulation framework.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135194375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-based proxy blind signature scheme on lattice in high-speed network environment 高速网络环境下基于格的身份代理盲签名方案
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-13 DOI: 10.3233/jhs-222021
Mengjiao Yang, Dongmei Ke, Fengyin Li
The methods of network attacks are becoming more and more diverse In high-speed networks, and protecting private data is a key issue for users’ security. Proxy blind signature technology combines proxy and blind signature technology to achieve signature transitivity and message confidentiality. However, current signature schemes will not be secure in quantum environments. Meanwhile, the certificate storage of the existing scheme is relatively complicated. Therefore, to avoid the need for certificates and resist quantum attacks, this paper proposes an anti-quantum identity-based proxy blind signature (ID-Proxy-BS) scheme on lattice. This ID-Proxy-BS scheme improves the efficiency of signature through Gaussian distribution and sampling techniques. Security analysis shows that the scheme satisfies correctness, efficiency, blindness, and unforgeability.
在高速网络中,网络攻击的手段越来越多样,保护用户的私有数据是事关用户安全的关键问题。代理盲签名技术结合了代理和盲签名技术,实现了签名的传递性和消息的保密性。然而,目前的签名方案在量子环境中并不安全。同时,现有方案的证书存储相对复杂。因此,为了避免对证书的需要和抵御量子攻击,本文提出了一种基于格的反量子身份的代理盲签名(ID-Proxy-BS)方案。该方案通过高斯分布和采样技术提高了签名效率。安全性分析表明,该方案满足正确性、高效性、盲性和不可伪造性。
{"title":"Identity-based proxy blind signature scheme on lattice in high-speed network environment","authors":"Mengjiao Yang, Dongmei Ke, Fengyin Li","doi":"10.3233/jhs-222021","DOIUrl":"https://doi.org/10.3233/jhs-222021","url":null,"abstract":"The methods of network attacks are becoming more and more diverse In high-speed networks, and protecting private data is a key issue for users’ security. Proxy blind signature technology combines proxy and blind signature technology to achieve signature transitivity and message confidentiality. However, current signature schemes will not be secure in quantum environments. Meanwhile, the certificate storage of the existing scheme is relatively complicated. Therefore, to avoid the need for certificates and resist quantum attacks, this paper proposes an anti-quantum identity-based proxy blind signature (ID-Proxy-BS) scheme on lattice. This ID-Proxy-BS scheme improves the efficiency of signature through Gaussian distribution and sampling techniques. Security analysis shows that the scheme satisfies correctness, efficiency, blindness, and unforgeability.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135785005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection using rough-fuzzy set and parallel quantum genetic algorithm 基于粗糙模糊集和并行量子遗传算法的入侵检测
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-30 DOI: 10.3233/jhs-222070
Zhang Ling, Gui Qi, Huang Min
An intrusion detection method using rough-fuzzy set and parallel quantum genetic algorithm (RFS-QGAID) is proposed in this paper. The RFS-QGAID is applied to solve the serious problems of determining the optimal antibodies subsets used to detect an anomaly. To obtain a simplified antibodies collection for high dimensional Log data sets, RFS is applied to delete the redundant antibody features and obtain the optimal antibodies features combination. Then, the optimal attitudes are entered into the QGA classifier for learning and training in the following stage. At last, the detected Log antigens are fed into RFS-QGAID, and we can classify the intrusion types. With RFS-QGAID, we give the simulations, the results on real Log data sets show that: the higher detection accuracy of RFS-QGAID is higher detection accuracy, but the false negative rate is lower for small samples sets, the adaptive performance is higher than other detection algorithms.
提出了一种基于粗糙模糊集和并行量子遗传算法(RFS-QGAID)的入侵检测方法。RFS-QAID用于解决确定用于检测异常的最佳抗体亚群的严重问题。为了获得高维Log数据集的简化抗体集合,应用RFS来删除多余的抗体特征,并获得最佳的抗体特征组合。然后,将最优态度输入到QGA分类器中,以便在下一阶段进行学习和训练。最后,将检测到的Log抗原输入RFS-QGAID中,对入侵类型进行分类。使用RFS-QAID进行仿真,在真实Log数据集上的结果表明:RFS-QGAID的检测精度越高,检测精度就越高,但对小样本集的假阴性率较低,自适应性能高于其他检测算法。
{"title":"Intrusion detection using rough-fuzzy set and parallel quantum genetic algorithm","authors":"Zhang Ling, Gui Qi, Huang Min","doi":"10.3233/jhs-222070","DOIUrl":"https://doi.org/10.3233/jhs-222070","url":null,"abstract":"An intrusion detection method using rough-fuzzy set and parallel quantum genetic algorithm (RFS-QGAID) is proposed in this paper. The RFS-QGAID is applied to solve the serious problems of determining the optimal antibodies subsets used to detect an anomaly. To obtain a simplified antibodies collection for high dimensional Log data sets, RFS is applied to delete the redundant antibody features and obtain the optimal antibodies features combination. Then, the optimal attitudes are entered into the QGA classifier for learning and training in the following stage. At last, the detected Log antigens are fed into RFS-QGAID, and we can classify the intrusion types. With RFS-QGAID, we give the simulations, the results on real Log data sets show that: the higher detection accuracy of RFS-QGAID is higher detection accuracy, but the false negative rate is lower for small samples sets, the adaptive performance is higher than other detection algorithms.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49660622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal relay nodes placement with game theory optimization for Wireless Sensor Networks 基于博弈论的无线传感器网络中继节点优化配置
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-29 DOI: 10.3233/jhs-222038
S. Radha, G. Bala, Nalluri Prophess Rajkumar, G. Indumathi, P. Nagabushanam
Wireless Sensor Networks (WSN) play a major role in the wide variety of applications like underground pipeline and leaks monitoring, temperature distribution monitoring in industrial cyber systems, military, forest life monitoring, and environmental and geographical monitoring. Sensors are widely used in these different applications. The number of sensors and the application concerned mainly decides the energy consumption, network lifetime. In this process relay nodes may help the sensors as backbone to connect with sink node or base stations. In this paper, we introduce a new approach for relay node selection in WSN to minimize the energy consumption of the network. It uses channel aware relay selection technique using game theory optimization and act as a virtual backbone in connecting to the base station. However, the relay nodes are varied to check the optimal number of relays required for the small, medium and large number of nodes deployed in the network. Simulations are carried out using Network Simulator NS-2.35 and network is analyzed in wide variety of scenarios. Results show that the proposed relay node selection algorithm reduces energy consumption, improves lifetime, throughput of the network.
无线传感器网络(WSN)在各种应用中发挥着重要作用,如地下管道和泄漏监测、工业网络系统中的温度分布监测、军事、森林生命监测以及环境和地理监测。传感器广泛应用于这些不同的应用中。传感器的数量和所涉及的应用主要决定能耗、网络寿命。在此过程中,中继节点可以帮助作为骨干的传感器与汇聚节点或基站连接。在本文中,我们介绍了一种在无线传感器网络中选择中继节点的新方法,以最小化网络的能耗。它使用博弈论优化的信道感知中继选择技术,并在连接到基站时充当虚拟骨干。然而,中继节点是可变的,以检查部署在网络中的小型、中型和大型节点所需的最佳中继数量。使用网络模拟器NS-2.35进行仿真,并在各种场景中分析网络。结果表明,所提出的中继节点选择算法降低了网络的能耗,提高了网络的使用寿命和吞吐量。
{"title":"Optimal relay nodes placement with game theory optimization for Wireless Sensor Networks","authors":"S. Radha, G. Bala, Nalluri Prophess Rajkumar, G. Indumathi, P. Nagabushanam","doi":"10.3233/jhs-222038","DOIUrl":"https://doi.org/10.3233/jhs-222038","url":null,"abstract":"Wireless Sensor Networks (WSN) play a major role in the wide variety of applications like underground pipeline and leaks monitoring, temperature distribution monitoring in industrial cyber systems, military, forest life monitoring, and environmental and geographical monitoring. Sensors are widely used in these different applications. The number of sensors and the application concerned mainly decides the energy consumption, network lifetime. In this process relay nodes may help the sensors as backbone to connect with sink node or base stations. In this paper, we introduce a new approach for relay node selection in WSN to minimize the energy consumption of the network. It uses channel aware relay selection technique using game theory optimization and act as a virtual backbone in connecting to the base station. However, the relay nodes are varied to check the optimal number of relays required for the small, medium and large number of nodes deployed in the network. Simulations are carried out using Network Simulator NS-2.35 and network is analyzed in wide variety of scenarios. Results show that the proposed relay node selection algorithm reduces energy consumption, improves lifetime, throughput of the network.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43501116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system 一种改进的具有信任值评估的PBFT共识机制在农产品可信追溯系统中的应用
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-28 DOI: 10.3233/jhs-222077
Weiqing Sun, Shengxin Wang, Shen Wei, Pengfei Cao, Yan Zhao, Lechao Xi, Xinlu Liu, Lihua Wang
Blockchain has the advantages of tamper proof, high reliability and traceability, so it can better support the agricultural product traceability system. However, the agricultural product supply chain has the characteristics of long chain and decentralized production, which makes the application of the combination of blockchain technology and agricultural product traceability have many nodes, large system overhead and other problems. In order to solve the above problems, this paper proposes a Practical Byzantine Fault Tolerance (PBFT) consensus mechanism based on trust value evaluation, and uses this optimization algorithm to propose an architecture model to meet the demand for trusted traceability of agricultural product supply chain, so as to realize the distributed storage and security protection of supply chain data. In order to ensure the effective operation of the blockchain system, this paper studies the consensus mechanism in the blockchain network, designs a trust value evaluation model to calculate the trust value of nodes, and selects trusted nodes to join the consensus group based on the trust value, which ensures the credibility of the consensus nodes. At the same time, the consistency protocol is optimized to reduce the communication overhead in the consensus process. The experimental results show that the consensus mechanism improved in this paper has certain advantages in communication overhead, transaction delay and throughput. Compared with the existing storage model, the model described in this paper has higher security and throughput efficiency, effectively ensures the reliable traceability of data, and can be better applied to the traceability scenario of agricultural product supply chain.
区块链具有不可篡改、高可靠性和可追溯性的优势,因此可以更好地支持农产品追溯系统。但农产品供应链具有链条长、生产分散的特点,这使得区块链技术与农产品溯源相结合的应用存在节点多、系统开销大等问题。为了解决上述问题,本文提出了一种基于信任值评估的实用拜占庭容错(PBFT)共识机制,并利用该优化算法提出了一个满足农产品供应链可信追溯需求的架构模型,从而实现供应链数据的分布式存储和安全保护。为了保证区块链系统的有效运行,本文研究了区块链网络中的共识机制,设计了一个信任值评估模型来计算节点的信任值,并根据信任值选择受信任的节点加入共识组,从而保证了共识节点的可信度。同时,对一致性协议进行了优化,以减少共识过程中的通信开销。实验结果表明,本文改进的共识机制在通信开销、事务延迟和吞吐量方面具有一定的优势。与现有的存储模型相比,本文描述的模型具有更高的安全性和吞吐效率,有效地保证了数据的可靠可追溯性,可以更好地应用于农产品供应链的可追溯场景。
{"title":"An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system","authors":"Weiqing Sun, Shengxin Wang, Shen Wei, Pengfei Cao, Yan Zhao, Lechao Xi, Xinlu Liu, Lihua Wang","doi":"10.3233/jhs-222077","DOIUrl":"https://doi.org/10.3233/jhs-222077","url":null,"abstract":"Blockchain has the advantages of tamper proof, high reliability and traceability, so it can better support the agricultural product traceability system. However, the agricultural product supply chain has the characteristics of long chain and decentralized production, which makes the application of the combination of blockchain technology and agricultural product traceability have many nodes, large system overhead and other problems. In order to solve the above problems, this paper proposes a Practical Byzantine Fault Tolerance (PBFT) consensus mechanism based on trust value evaluation, and uses this optimization algorithm to propose an architecture model to meet the demand for trusted traceability of agricultural product supply chain, so as to realize the distributed storage and security protection of supply chain data. In order to ensure the effective operation of the blockchain system, this paper studies the consensus mechanism in the blockchain network, designs a trust value evaluation model to calculate the trust value of nodes, and selects trusted nodes to join the consensus group based on the trust value, which ensures the credibility of the consensus nodes. At the same time, the consistency protocol is optimized to reduce the communication overhead in the consensus process. The experimental results show that the consensus mechanism improved in this paper has certain advantages in communication overhead, transaction delay and throughput. Compared with the existing storage model, the model described in this paper has higher security and throughput efficiency, effectively ensures the reliable traceability of data, and can be better applied to the traceability scenario of agricultural product supply chain.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45946779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lattice-based efficient heterogeneous signcryption scheme for secure network communications 一种基于格的高效异构签名加密方案,用于安全网络通信
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-25 DOI: 10.3233/jhs-222020
Siqi Yu, Mengxue Shang, Fengyin Li
Ensuring the security of transmitted content is an important task in network communication. Signcryption technology combines signature and encryption operations in a single step to achieve message authentication and confidentiality. In practical applications, users are usually in different cryptographic systems, the ordinary signcryption technology cannot realize communication between two different cryptographic systems. And the ciphertext structure of the existing signcryption schemes is relatively complex, signcryption is not efficient. Therefore, in order to solve the problem of efficient communication between different cryptosystems and ensure quantum security, this paper proposes a lattice-based efficient heterogeneous signcryption scheme for secure network communications. This signcryption scheme accomplishes signcryption through matrix operations and hash functions, which avoids complex signcryption structures, efficiently realizes bidirectional message communication between identity-based cryptosystems and certificateless cryptosystems.
确保传输内容的安全是网络通信中的一项重要任务。签密技术将签名和加密操作结合在一个步骤中,以实现消息身份验证和机密性。在实际应用中,用户通常处于不同的密码系统中,普通的签密技术无法实现两个不同密码系统之间的通信。并且现有的签密方案的密文结构相对复杂,签密效率不高。因此,为了解决不同密码系统之间的高效通信问题,确保量子安全,本文提出了一种基于格的高效异构签密安全网络通信方案。该签密方案通过矩阵运算和散列函数实现签密,避免了复杂的签密结构,有效地实现了基于身份的密码系统和无证书密码系统之间的双向消息通信。
{"title":"A lattice-based efficient heterogeneous signcryption scheme for secure network communications","authors":"Siqi Yu, Mengxue Shang, Fengyin Li","doi":"10.3233/jhs-222020","DOIUrl":"https://doi.org/10.3233/jhs-222020","url":null,"abstract":"Ensuring the security of transmitted content is an important task in network communication. Signcryption technology combines signature and encryption operations in a single step to achieve message authentication and confidentiality. In practical applications, users are usually in different cryptographic systems, the ordinary signcryption technology cannot realize communication between two different cryptographic systems. And the ciphertext structure of the existing signcryption schemes is relatively complex, signcryption is not efficient. Therefore, in order to solve the problem of efficient communication between different cryptosystems and ensure quantum security, this paper proposes a lattice-based efficient heterogeneous signcryption scheme for secure network communications. This signcryption scheme accomplishes signcryption through matrix operations and hash functions, which avoids complex signcryption structures, efficiently realizes bidirectional message communication between identity-based cryptosystems and certificateless cryptosystems.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42270931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling a stacked dense network model for outlier prediction over medical-based heart prediction data 基于医学心脏预测数据的离群值预测的堆叠密集网络模型建模
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-14 DOI: 10.3233/jhs-222079
B. R. Krishna, V. Mahalakshmi, Gopala Krishna Murthy Nookala
Recently, deep learning has been used in enormous successful applications, specifically considering medical applications. Especially, a huge number of data is captured through the Internet of Things (IoT) based devices related to healthcare systems. Moreover, the given captured data are real-time and unstructured. However, the existing approaches failed to reach a better accuracy rate, and the processing time needed to be lower. This work considers the medical database for accessing the patient’s record to determine the outliers over the dataset. Based on this successful analysis, a novel approach is proposed where some feasible and robust features are extracted to acquire the emotional variations for various ways of expression. Here, a novel dense-Convolutional Neural Network (CNN) with ResNet (CNN-RN) extracts features from patients’, while for establishing visual modality, deep residual network layers are used. The significance of feature extraction is less sensitive during outlier prediction while modeling the context. To handle these issues, this dense network model is used for training the network in an end-to-end manner by correlating the significance of CNN and RN of every stream and outperforming the overall approach. Here, MATLAB 2020b is used for simulation purposes, and the model outperforms various prevailing methods for consistent prediction. Some performance metrics include detection accuracy, F1-score, recall, MCC, p-value, etc. Based on this evaluation, the experimental results attained are superior to other approaches.
最近,深度学习已经在许多成功的应用中得到了应用,特别是在医疗应用中。特别是,通过与医疗系统相关的基于物联网(IoT)的设备捕获大量数据。此外,给定的捕获数据是实时的和非结构化的。然而,现有的方法无法达到更好的准确率,并且需要更低的处理时间。这项工作考虑了访问患者记录的医疗数据库,以确定数据集上的异常值。在此基础上,提出了一种新颖的方法,提取可行且鲁棒的特征来获取各种表达方式的情感变化。本文采用基于ResNet的新型密集卷积神经网络(CNN) (CNN- rn)对患者进行特征提取,并利用深度残差网络层建立视觉模态。特征提取的重要性在上下文建模的离群值预测中不太敏感。为了解决这些问题,通过将每个流的CNN和RN的重要性关联起来,使用这种密集网络模型以端到端方式训练网络,并且优于整体方法。本文使用MATLAB 2020b进行仿真,该模型在一致性预测方面优于各种流行方法。一些性能指标包括检测精度、f1分数、召回率、MCC、p值等。在此基础上,得到的实验结果优于其他方法。
{"title":"Modelling a stacked dense network model for outlier prediction over medical-based heart prediction data","authors":"B. R. Krishna, V. Mahalakshmi, Gopala Krishna Murthy Nookala","doi":"10.3233/jhs-222079","DOIUrl":"https://doi.org/10.3233/jhs-222079","url":null,"abstract":"Recently, deep learning has been used in enormous successful applications, specifically considering medical applications. Especially, a huge number of data is captured through the Internet of Things (IoT) based devices related to healthcare systems. Moreover, the given captured data are real-time and unstructured. However, the existing approaches failed to reach a better accuracy rate, and the processing time needed to be lower. This work considers the medical database for accessing the patient’s record to determine the outliers over the dataset. Based on this successful analysis, a novel approach is proposed where some feasible and robust features are extracted to acquire the emotional variations for various ways of expression. Here, a novel dense-Convolutional Neural Network (CNN) with ResNet (CNN-RN) extracts features from patients’, while for establishing visual modality, deep residual network layers are used. The significance of feature extraction is less sensitive during outlier prediction while modeling the context. To handle these issues, this dense network model is used for training the network in an end-to-end manner by correlating the significance of CNN and RN of every stream and outperforming the overall approach. Here, MATLAB 2020b is used for simulation purposes, and the model outperforms various prevailing methods for consistent prediction. Some performance metrics include detection accuracy, F1-score, recall, MCC, p-value, etc. Based on this evaluation, the experimental results attained are superior to other approaches.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44937314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved design of load balancing for multipath routing protocol 改进的多径路由协议负载均衡设计
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-08 DOI: 10.3233/jhs-222063
Daqiang Liao, Du Zou, Gautam Srivastava
In this paper, an improved routing protocol for multipath network load balancing is proposed for defects in the traditional AOMDV (Ad hoc On-demand Multipath Distance Vector) protocol. This research work analyzes problems in traditional routing protocols and estimates the available path load according to network transmission in Wireless Mesh Networks (WMN). Moreover, we design a load distribution scheme according to a given load and improve multi-path load balancing by using the MCMR method. We also control path discovery and the number of paths while also establishing routing paths and probability balancing. Lastly, improvements are made to the AOMDV protocol and efficient data transmission is acheived. The performance results of the modified routing protocol show that the designed protocol can improve successful delivery rate and prolong network survival time.
针对传统AOMDV (Ad hoc On-demand multipath Distance Vector)协议存在的缺陷,提出了一种改进的多径网络负载均衡路由协议。本研究分析了传统路由协议存在的问题,并根据无线网状网络(WMN)的网络传输情况估计了可用路径负载。此外,根据给定的负载设计了负载分配方案,并利用MCMR方法改进了多路径负载均衡。我们还控制路径发现和路径数量,同时建立路由路径和概率平衡。最后,对AOMDV协议进行了改进,实现了高效的数据传输。改进后的路由协议性能结果表明,改进后的路由协议能够提高成功投递率,延长网络生存时间。
{"title":"Improved design of load balancing for multipath routing protocol","authors":"Daqiang Liao, Du Zou, Gautam Srivastava","doi":"10.3233/jhs-222063","DOIUrl":"https://doi.org/10.3233/jhs-222063","url":null,"abstract":"In this paper, an improved routing protocol for multipath network load balancing is proposed for defects in the traditional AOMDV (Ad hoc On-demand Multipath Distance Vector) protocol. This research work analyzes problems in traditional routing protocols and estimates the available path load according to network transmission in Wireless Mesh Networks (WMN). Moreover, we design a load distribution scheme according to a given load and improve multi-path load balancing by using the MCMR method. We also control path discovery and the number of paths while also establishing routing paths and probability balancing. Lastly, improvements are made to the AOMDV protocol and efficient data transmission is acheived. The performance results of the modified routing protocol show that the designed protocol can improve successful delivery rate and prolong network survival time.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45647754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-aware resource management approaches in software defined networks: Comprehensive analysis, opportunities and challenges 软件定义网络中的安全感知资源管理方法:综合分析、机遇与挑战
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-25 DOI: 10.3233/jhs-230004
Monire Norouzi, Zeynep Gürkas Aydin, Sefer Ergen, Mehmet Serif Bakir
Today, with the fast growth of emerging technologies and applying numerous advantages of 5G communications, there is a critical gap between the supporting security of data transmission and resource management of Software Defined Networks (SDN). To provide a secure communication perspective for Internet of Things (IoT) devices and smart applications, network slicing in resource management is currently an important issue and is widely studied for the SDN. Due to the importance of security-aware resource management in several aspects of the SDN, this research aims to represent a new comprehensive review of existing technical classification and deep-detailed categorization of resource management approaches for SDN communications in the IoT environments. Based on each category, a technical taxonomy is presented to show a variety of security-aware platforms that include resource allocation, service composition, task scheduling, and service offloading in the IoT environments. According to the main state-of-the-art discussed comprehensive technical review, some important evaluation factors, main methodologies, advantages, and disadvantages of each case study are elaborated. Finally, some important new research directions and open challenges are presented for future scientific efforts.
如今,随着新兴技术的快速发展和5G通信的众多优势的应用,软件定义网络(SDN)的数据传输安全支持与资源管理之间存在着重大差距。为了为物联网(IoT)设备和智能应用提供安全的通信视角,资源管理中的网络切片是当前SDN中一个重要的问题,并被广泛研究。由于安全感知资源管理在SDN多个方面的重要性,本研究旨在对物联网环境下SDN通信的现有技术分类和资源管理方法的深入详细分类进行新的全面审查。基于每个类别,提出了一个技术分类,以显示各种安全感知平台,包括物联网环境中的资源分配、服务组合、任务调度和服务卸载。在综合技术综述的基础上,阐述了各案例研究的主要评价因素、主要评价方法和优缺点。最后,提出了今后科学研究的一些重要方向和有待解决的问题。
{"title":"Security-aware resource management approaches in software defined networks: Comprehensive analysis, opportunities and challenges","authors":"Monire Norouzi, Zeynep Gürkas Aydin, Sefer Ergen, Mehmet Serif Bakir","doi":"10.3233/jhs-230004","DOIUrl":"https://doi.org/10.3233/jhs-230004","url":null,"abstract":"Today, with the fast growth of emerging technologies and applying numerous advantages of 5G communications, there is a critical gap between the supporting security of data transmission and resource management of Software Defined Networks (SDN). To provide a secure communication perspective for Internet of Things (IoT) devices and smart applications, network slicing in resource management is currently an important issue and is widely studied for the SDN. Due to the importance of security-aware resource management in several aspects of the SDN, this research aims to represent a new comprehensive review of existing technical classification and deep-detailed categorization of resource management approaches for SDN communications in the IoT environments. Based on each category, a technical taxonomy is presented to show a variety of security-aware platforms that include resource allocation, service composition, task scheduling, and service offloading in the IoT environments. According to the main state-of-the-art discussed comprehensive technical review, some important evaluation factors, main methodologies, advantages, and disadvantages of each case study are elaborated. Finally, some important new research directions and open challenges are presented for future scientific efforts.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"19 1","pages":"169-181"},"PeriodicalIF":0.9,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88995752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of High Speed Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1