The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
International Journal on Cryptography and Information Security ( IJCIS)
ISSN : 1839-8626
https://wireilla.com/ijcis/index.html
New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)
Selective Encryption of Image by Number Maze Technique
Santosh Mutnuru, Sweeti Kumari Sah and S. Y Pavan Kumar, Eastern Michigan University, USA
Towards A Deeper NTRU Analysis: A Multi Modal Analysis
Chuck Easttom1, Anas Ibrahim2, Alexander Chefranov3, Izzat Alsmadi4 and Richard Hansen5, 1Adjunct Georgetown University and University of Dallas, 2&3Eastern Mediterranean University, 4Texas A&M University, 5Capitol Technology University
https://wireilla.com/ijcis/vol10.html
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
International Journal on Cryptography and Information Security ( IJCIS)
ISSN : 1839-8626
https://wireilla.com/ijcis/index.html
New Research Articles 2020 June Issue International Journal on Cryptography and Information Security (IJCIS)
Selective Encryption of Image by Number Maze Technique
Santosh Mutnuru, Sweeti Kumari Sah and S. Y Pavan Kumar, Eastern Michigan University, USA
Towards A Deeper NTRU Analysis: A Multi Modal Analysis
Chuck Easttom1, Anas Ibrahim2, Alexander Chefranov3, Izzat Alsmadi4 and Richard Hansen5, 1Adjunct Georgetown University and University of Dallas, 2&3Eastern Mediterranean University, 4Texas A&M University, 5Capitol Technology University
https://wireilla.com/ijcis/vol10.html
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multipath routing algorithms for mobile ad hoc networks (MANETs).
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
The Interconnection of nanoscale devices with existing Information and communication technologies (ICT), defines a new networking paradigm called “Internet of Nano-Things"
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multipath routing algorithms for mobile ad hoc networks (MANETs).
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
Mobile Next Generation Network (MNGN) is characterized as heterogeneous network where variety of access technologies are meant to coexist. Decisions on choosing an air interface that meets a particular need at a particular time will be shifted from the network’s side to (a more intelligent) user’s side. On top of that network operators and regularities have come to the realization that assigned spectrum bands are not utilized as they should be. Cognitive radio stands out as a candidate technology to address many emerging issues in MNGN such as capacity, quality of service and spectral efficiency. As a transmission strategy, cognitive radio systems depend greatly on sensing the radio environment. In this paper, we present a novel approach for interference characterization in cognitive radio networks based on wideband chirp signal. The results presented show that improved sensing accuracy is maintained at tolerable system complexity.
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters.
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
A data dissemination protocol for wireless sensor networks has been engaged for modifying configuration fields and circulating management controls to the mote. Earlier, a data dissemination protocol faces the henceforth two consequences. First, they are works on sink based model; only the sink can circulate data item to other motes. Such model is not suitable for large user wireless sensor networks. Second, those protocols are not provide with any security and hence intruders will make problems to misuse the network. We provided the seDrip protocol. It allows the network mentors to authorize multiple network uses with various permissions to simultaneously and directly distributed data items to the mote. seDrip is implemented in an laboratory of network restricted resources mote to depict its large capability in practice.
The Interconnection of nanoscale devices with existing Information and communication technologies (ICT), defines a new networking paradigm called “Internet of Nano-Things"
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
Several researches are focused on the QoS (Quality of Service) and Energy consumption in wireless Multimedia Sensor Networks. Those research projects invest in theory and practice in order to extend the spectrum of use of norms, standards and technologies which are emerged in wireless communications.
The performance of these technologies is strongly related to domains of use and limitations of their characteristics. In this paper, we give a comparison of ZigBee technology, most widely used in sensor networks, and UWB (Ultra Wide Band) which presents itself as competitor that present in these work better results for audiovisual applications with medium-range and high throughput.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic
source routing (DSR) protocol.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
A collaborative physical layer security schemeIJECEIAES
High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
Top Cited Articles in 2019 - International Journal of Network Security & Its ...IJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
Most viewed articles - International Journal of Advanced Smart Sensor Network...ijassn
Scope & Topics
With the availability of low cost, short range sensor technology along with advances in wireless networking, sensor networks has become a hot topic of discussion. The International Journal of Advanced Smart Sensor Network Systems is an open access peer-reviewed journal which focuses on applied research and applications of sensor networks. While sensor networks provide ample opportunities to provide various services, its effective deployment in large scale is still challenging due to various factors. This journal provides a forum that impacts the development of high performance computing solutions to problems arising due to the complexities of sensor network systems. It also acts as a path to exchange novel ideas about impacts of sensor networks research.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
The high-level contribution of this paper is a detailed simulation based analysis about the impact of mobility models on the performance of node-disjoint and link-disjoint multi-path routing algorithms for mobile ad hoc networks (MANETs).
Optical network is an emerging technology for data communication
inworldwide. The information is transmitted from the source to destination
through the fiber optics. All optical network (AON) provides good
transmission transparency, good expandability, large bandwidth, lower bit
error rate (BER), and high processing speed. Link failure and node failure
haveconsistently occurred in the traditional methods. In order to overcome
the above mentioned issues, this paper proposes a robust software defined
switching enabled fault localization framework (SDSFLF) to monitor the
node and link failure in an AON. In this work, a novel faulty node
localization (FNL) algorithm is exploited to locate the faulty node. Then, the
software defined faulty link detection (SDFLD) algorithm that addresses the
problem of link failure. The failures are localized in multi traffic stream
(MTS) and multi agent system (MAS). Thus, the throughput is improved in
SDSFLF compared than other existing methods like traditional routing and
wavelength assignment (RWA), simulated annealing (SA) algorithm, attackaware RWA (A-RWA) convex, longest path first (LPF) ordering, and
biggest source-destination node degree (BND) ordering. The performance of
the proposed algorithm is evaluated in terms of network load, wavelength
utilization, packet loss rate, and burst loss rate. Hence, proposed SDSFLF
assures that high performance is achieved than other traditional techniques.
Top cited 2nd articles in 2017 - International Journal of Network Security & ...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
AIRCC's International Journal of Computer Network & Communications( IJCNC) is dedicated to strengthen the field of Computer Networks and Communications and publishes only good quality papers. IJCNC is highly selective and maintains less than 5% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc. Papers published in IJCNC has received enormous citations and has been regarded as one of the best Journal in the networking research field.
Similar to IJCNC Top 10 Trending Articles in Academia !!! (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
The Optimal Link State Routing (OLSR) protocol employs multipoint relay (MPR) nodes to disseminate topology control (TC) messages, enabling network topology discovery and maintenance. However, this approach increases control overhead and leads to wasted network bandwidth in stable topology scenarios due to fixed flooding periods. To address these challenges, this paper presents an Efficient Topology Maintenance Algorithm (ETM-OLSR) for Enhanced Link-State Routing Protocols. By reducing the number of MPR nodes, TC message generation and forwarding frequency are minimized. Furthermore, the algorithm selects a smaller subset of TC messages based on the changes in the MPR selection set from the previous cycle, adapting to stable and fluctuating network conditions. Additionally, the sending cycle of TC messages is dynamically adjusted in response to network topology changes. Simulation results demonstrate that the ETM-OLSR algorithm effectively reduces network control overhead, minimizes end-to-end delay, and improves network throughput compared to traditional OLSR and HTR-OLSR algorithms.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
2. AN EFFICIENT DATA COLLECTION PROTOCOL FOR UNDERWATER
WIRELESS SENSOR NETWORKS
Khaled Day1
, Faiza Al-Salti2
, Abderezak Touzene1
and Nasser Alzeidi1
1
Department of Computer Science, Sultan Qaboos University, Muscat, Oman
2
Muscat College, Muscat, Oman
Abstract
This paper presents the design and evaluation of a new data collection protocol for Underwater
Wireless Sensor Networks called the Data Collection Tree Protocol (DCTP). It uses an efficient
distributed algorithm to proactively construct and maintain a data collection tree rooted at the
sink node. The preconstructed and maintained data collection tree allows the efficient selection
of a single forwarding node at each hop when routing a data packet. We prove the correctness of
the constructed data collection tree and we show that under some stability conditions, the
constructed tree converges to an optimal shortestpath tree. Results of extensive simulations show
a big improvement in terms of packet delivery ratio, endto-end delay and energy consumption
compared to the well-known VBF protocol. The simulated cases show increases in the packet
delivery ratio between 20% and 122%, reductions in the average end-to-enddelay between 15%
and 55% and reductions in the energy consumption between 20% and 50%. These results clearly
demonstrate the attractiveness of the proposed DCTP protocol.
Keywords:
Underwater Wireless Sensor Networks, Data Collection, Routing Protocols, Performance
Evaluation
Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc01.pdf
Volume Link: http://airccse.org/journal/ijc2020.html
References
[1] K. Chen, M. Ma, E. Cheng, F. Yuan, and W. Su, A Survey on MAC Protocols for
Underwater Wireless Sensor Networks, IEEE Comm. Surveys & Tut., vol. 16, no. 3, pp. 1433–
1447, 2014.
[2] G. Tuna, G andV.C. Gungor, A Survey on Deployment Techniques, Localization Algorithms,
and Research Challenges for Underwater Acoustic Sensor Networks. Int. J. Commun. Syst., Vol.
30, Issue 17, pp. 1-21, 2017.
3. [3] Z. Wang,X. Feng, G. Han, Y. Sui, and H. Qin, EODL: Energy Optimized Distributed
Localization Method in 3DUnderwater Acoustic Sensors Networks. Computer Networks 2018,
141, 179–188.
[4] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based
Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks,
volume 23, no. 4, pp. 1301–1314, May 2017.
[5] R. Gomathi andJ.M.L. Manickam, Energy Efficient Shortest Path Routing Protocol for
Underwater Acoustic Wireless Sensor Network. Wireless Personal Commun. 2018, 98, 843–856.
[6] S. M. Ghoreyshi, A. Shahrabi, and T. Boutaleb, Void-Handling Techniques for Routing
Protocols in Underwater Sensor Networks: Survey and Challenges. IEEE Communications
Surveys Tutorials 19, 2 (Secondquarter 2017), 800–827, 2017.
[7] Z. H. Jiang, Underwater Acoustic Networks-Issues and Solutions, International Journal of
Intelligent Control and Systems, vol. 13, no. 3, pp.152–161, 2008.
[8] M. Ahmed, Routing Protocols for Underwater Wireless Sensor Network Based on Location:
A Survey, Ad Hoc & Sensor Wireless Networks, 38:67-101, 2018.
[9] T. Islam, andY. K. Lee, A Comprehensive Survey of Recent Routing Protocols for
Underwater Acoustic Sensor Networks. Sensors, 19(19), 4256. doi:10.3390/s19194256.
[10] G. Han, J. Jiang, N. Bao, L. Wan, and M. Guizani, Routing Protocols for Underwater
Wireless Sensor Networks, IEEE Communications Magazine, pp. 72-78, November 2015.
[11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater
Sensor Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–
1221.
[12] H. Yan, Z. J. Shi, and J.-H. Cui, Depth Based Routing for Underwater Sensor Networks, in
Proc. 7th International IFIP-TC6 Networking Conference on Ad-Hoc and Sensor Networks,
Wireless Networks, Next Generation Internet, Singapore, 2008, pp. 72-86.
[13] J. M. Jornet, M. Stojanovic, and M. Zorzi, Focused Beam Routing Protocol for Underwater
Acoustic Networks, I Proc. International Conference on Mobile Computing and Networking,
ACM International Workshop on Underwater Networks, San Francisco, 2008. pp. 75–82.
[14] Y.-S. Chen, T.-Y. Juang, Y.-W. Lin, and I.-C. Tsai, A Low Propagation Delay Multi-Path
Routing Protocol for Underwater Sensor Networks,J. of Int. Technology, vol. 11, no. 2, 153–165,
2010.
4. [15] P. Xie et al., Aqua-Sim: An NS-2 Based Simulator for Underwater Sensor Networks, in
Proceedings of MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local
Challenges (OCEANS 2009), 2009, pp. 1–7.
[16] LinkQuest: Underwater Acoustic Modem Models. [Online]. Available:
http://www.linkquest.com/html/models1.htm. [Accessed: 10-Apr-2018].
[17] J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, The challenges of building mobile underwater
wireless networks for aquatic applications, IEEE Networks, vol. 20, no. 3, pp. 12–18, May 2006.
[18] Z. S. Peng Xie, Zhong Zhou, Zheng Peng, Jun-hong Cui, Void Avoidance in Mobile
Underwater Sensor Networks, in WUWNet’07, 2007.
[19] X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, A Group Mobility Model for Ad Hoc
Wireless Networks, in Proceedings of the 2nd ACM International Workshop on Modeling,
Analysis and Simulation of Wireless and Mobile Systems - MSWiM ’99, 1999, pp. 53–60.
[20] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, Scalable Localization with Mobility
Prediction for Underwater Sensor Networks, IEEE Trans. Mob. Comput., vol. 10, no. 3, pp. 335–
348, Mar. 2011.
[21] Faiza Al-Salti, Nasser Alzeidi , Khaled Day , Abderezak Touzene, An Efficient and Reliable
GridBased Routing Protocol for UWSNs by Exploiting Minimum Hop Count, Computer
Networks 162 (2019) 106869.
5. A SECURE DATA COMMUNICATION SYSTEM USING
CRYPTOGRAPHY AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University,
Amman,Jordan.
Abstract
The information security has become one of the most significant problems in data
communication. So it becomes an inseparable part of data communication. In order to address
this problem, cryptography and steganography can be combined. This paper proposes a secure
communication system. It employs cryptographic algorithm together with steganography. The
jointing of these techniques provides a robust and strong communication system that able to
withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text
message, it provide high level of security, scalability and speed. After that, a discrete wavelet
transforms (DWT) based steganography is employed to hide the encrypted message in the cover
image by modifying the wavelet coefficients. The performance of the proposed system is
evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results
show that, the proposed system provides high level of security.
Keywords:
Steganography, Cryptography, DWT, Filter bank, PSNR.
Orginal Source URL: http://airccse.org/journal/cnc/5313cnc10.pdf
Volime Link: http://airccse.org/journal/ijc2013.html
References
[1 ] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting
and Decrypting Data" International Journal of Computer Networks & Communications (IJCNC)
Vol.5, No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for
Steganography and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase
Notational System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No.
1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol.
13, No. 5.
6. [5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in
images", IEEE, 2nd International conference on Computing, Communication and Networking
Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography
Using Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and
Electrical Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and
High Capacity Image Steganography Technique", Signal & Image Processing : An International
Journal (SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme",
IEEE International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation
Through Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of
International Symposium on Electronic System Design, IEEE Conference Publications, pp 225 –
229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model
Based on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International
Conference for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and
Multimedia Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International
Conference on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image
Steganography", IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography
using Discrete Wavelet Transform", International Journal of Computer Science and Security
(IJCSS), Vol. 3: Issue (6) pp 462-472.
7. [16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks
and Lifting over Finite Fields” In IEEE International Conference on Communications (ICC),
Dresden, Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique
based on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
8. JAMMING DETECTION BASED ON DOPPLER SHIFT ESTIMATION IN
VEHICULAR COMMUNICATIONS SYSTEMS
Javad Afshar Jahanshahi
Universidad Católica Los Ángeles de Chimbote, Instituto de Investigación, Chimbote, Perú
Abstract
Since Doppler shift is one of the most important parameters in wireless propagation, the
evaluation of the Doppler shift at the base station (BTS) in vehicular communications improves
BTS in many aspects such as channel varying rate, jamming detection, and handover operations.
Therefore, in this study, we propose a novel method at a base station based on the received user
signal to estimate the channel Doppler shift seen by BTS. Utilizing the inherent information
existed in common receivers, a level crossing rate (LCR) based Doppler shift estimation
algorithm is developed without any excessive hardware. Moreover, a jamming detection
algorithm is improved based on the proposed Doppler shift estimation scheme. The performance
of the proposed scheme is evaluated in a Terrestrial Trunked Radio (TETRA) network, and
comprehensive experimental results have shown superior performance in a wide range of
velocities, signal to noise ratios and jammers.
Keywords:
Jamming Detection, Vehicular Communications, Level Crossing Rate, Mobile Communication,
TETRA (Terrestrial Trunked Radio).
Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc02.pdf
Volime Link: http://airccse.org/journal/ijc2020.html
References
[1] Sampath, A., &Holtzman, J. M. (2003, May). Estimation of maximum Doppler frequency for
handoff decisions.In IEEE 43rd Vehicular Technology Conference (pp. 859-862).IEEE.
[2] Merwaday, A., &Güvenç, I. (2016). Handover count based velocity estimation and mobility
state detection in dense HetNets. IEEE Transactions on Wireless Communications, 15(7), 4673-
4688.
[3] Baddour, K. E., & Beaulieu, N. C. (2015). Robust Doppler spread estimation in nonisotropic
fading channels. IEEE Transactions on Wireless Communications, 4(6), 2677-2682.
[4] Bellili, F., Selmi, Y., Affes, S., &Ghrayeb, A. (2017). A low-cost and robust maximum
likelihood joint estimator for the Doppler spread and CFO parameters over flat-fading Rayleigh
channels. IEEE Transactions on Communications, 65(8), 3467-3478.
9. [5] Anim-Appiah, K. D. (1999). On generalized covariance-based velocity estimation. IEEE
Transactions on Vehicular Technology, 48(5), 1546-1557.
[6] Zhang, H., &Abdi, A. (2009). Nonparametric mobile speed estimation in fading channels:
Performance analysis and experimental results. IEEE transactions on wireless communications,
8(4), 1683-1692.
[7] Holtzman, J. M., &Sampath, A. (2005). Adaptive averaging methodology for handoffs in
cellular systems. IEEE Transactions on Vehicular Technology, 44(1), 59-66.
[8] Zemen, T., &Molisch, A. F. (2012). Adaptive reduced-rank estimation of nonstationary time-
variant channels using subspace selection. IEEE Transactions on Vehicular Technology, 61(9),
4042-4056.
[9] Tepedelenlioğlu, C., Abdi, A., Giannakis, G. B., &Kaveh, M. (2011). Estimation of Doppler
spread and signal strength in mobile communications with applications to handoff and adaptive
transmission. Wireless Communications and Mobile Computing, 1(2), 221-242.
[10] Engdahl, K., &Andersson, L. (2010).Detection of high velocity movement in a
telecommunication system.U.S. Patent No. 7,647,049. Washington, DC: U.S. Patent and
Trademark Office.
[11] Austin, M. D., &Stuber, G. L. (2004). Velocity adaptive handoff algorithms for
microcellular systems. IEEE Transactions on Vehicular Technology, 43(3), 549-561.
[12] Klein, T. E., Leung, K. K., &Zheng, H. (2007).Method and apparatus for scheduling
transmissions in wireless data networks.U.S. Patent No. 7,283,814. Washington, DC: U.S. Patent
and Trademark Office.
[13] Mottier, D., &Castelain, D. (2009, September). A Doppler estimation for UMTS-FDD
based on channel power statistics. In Gateway to 21st Century Communications Village.VTC
1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No. 99CH36324) (Vol. 5,
pp. 3052-3056).IEEE.
[14] Liu, Q. Y., Wang, M., &Zhong, Z. D. (2011). Statistics of capacity analysis in high speed
railway communication systems. Tamkang Journal of Science and Engineering, 14(3), 209-215.
[15] Tepedelenlioğlu, C., Abdi, A., Giannakis, G. B., &Kaveh, M. (2011). Estimation of Doppler
spread and signal strength in mobile communications with applications to handoff and adaptive
transmission. Wireless Communications and Mobile Computing, 1(2), 221-242.
[16] Zhang, C., Fan, P., Dong, Y., &Xiong, K. (2015). Service‐based high‐speed railway base
station arrangement. Wireless Communications and Mobile Computing, 15(13), 1681-1694.
10. [17] Jingyu, H., Xiaohu, Y., Bin, S., & Kim, Y. H. (2014, May). A Scheme for the Doppler shift
estimation despite the Power control in Mobile Communication Systems. In 2004 IEEE 59th
Vehicular Technology Conference.VTC 2004-Spring (IEEE Cat.No. 04CH37514) (Vol. 1, pp.
284- 288).IEEE.
[18] Shu, M. L., Hua, J. Y., Li, F., Xu, Z. J., & Wang, D. M. (2014, November). Doppler shift
estimation exploiting iterative processing in mobile communications. In 2014 International
Workshop on High Mobility Wireless Communications (pp. 53-56). IEEE.
[19] Austin, M. D., &Stuber, G. L. (2004). Eigen-based Doppler estimation for differentially
coherent CPM. IEEE transactions on Vehicular Technology, 43(3), 781-785.
[20] Choi, Y. S., &Alamouti, S. (2010).Doppler frequency determination for mobile wireless
devices.U.S. Patent No. 7,801,084. Washington, DC: U.S. Patent and Trademark Office.
[21] Jinyu, H., Han, H., Qingmin, M., &Xiaohu, Y. (2014, September). A scheme for the SNR
estimation and its application in Doppler shift estimation of mobile communication systems.In
IEEE 60th Vehicular Technology Conference, 2004.VTC2004-Fall.2004 (Vol. 1, pp. 24-
27).IEEE.
[22] Ke, X. Q., Yuan, F., Gao, C. X., & Cheng, E. (2018, December). A robust and efficient
digital FM underwater acoustic voice communication system based on SNR estimation.In
Proceedings of the Thirteenth ACM International Conference on Underwater Networks &
Systems (pp. 1-5).
[23] Krasny, L., Arslan, H., Koilpillai, D., &Chennakeshu, S. (2011). Doppler spread estimation
in mobile radio systems. IEEE communications letters, 5(5), 197-199.
[24] Veluppillai, M., Sangary, N. T., Simmons, S. B., &Jarmuszewski, P. (2013).Method, device
and system for detecting the mobility of a mobile device.U.S. Patent No. 8,442,447. Washington,
DC: U.S. Patent and Trademark Office.
[25] Narasimhan, R., & Cox, D. C. (2009). Speed estimation in wireless systems using wavelets.
IEEE Transactions on Communications, 47(9), 1357-1364.
[26] Rezende, C., Boukerche, A., Pazzi, R. W., Rocha, B. P., &Loureiro, A. A. (2011). The
impact of mobility on mobile ad hoc networks through the perspective of complex networks.
Journal of Parallel and Distributed Computing, 71(9), 1189-1200.
[27] Sha, Y., Yao, N., &Xu, X. (2008, October). Improvement and Performance Analysis of A
Scheme for the Maximum Doppler Frequency Estimation. In 2008 4th International Conference
on Wireless Communications, Networking and Mobile Computing (pp. 1-4).IEEE.
[28] Nanda, S., Rezaiifar, R., &Yavuz, M. (2014).Method and apparatus for interference
management, U.S. Patent No. 8,923,212. Washington, DC: U.S. Patent and Trademark Office.
11. [29] Cho, M. G., & Hong, D. (2016).Velocity Estimation Apparatus and Method Using Level
Crossing Rate.U.S. Patent No. 7,120,440. Washington, DC: U.S. Patent and Trademark Office.
[30] Forenza, A., & Perlman, S. G. (2017).System and method for managing inter-cluster
handoff of clients which traverse multiple DIDO clusters, U.S. Patent No. 9,826,537.
Washington, DC: U.S. Patent and Trademark Office.
[31] Mark, S., Rafael, C., & Salomon, S. (2013). Transceivers and method for use in radio
communications. European Patent Application, EP, 1(304), 895.
[32] Gorokhov, A., Khandekar, A., Tingfang, J. I., &Bhushan, N. (2015).System and method to
enable resource partitioning in wireless networks.U.S. Patent No. 9,179,469. Washington, DC:
U.S. Patent and Trademark Office.
[33] Moscovitz, Y., Deperini, F., &Locatelli, M. (2010).Method and User Equipment for
Jamming Detection and Signaling in a Mobile Telecommunications Network,U.S. Patent No.
7,680,450. Washington, DC: U.S. Patent and Trademark Office.
[34] Breuer, V., &Wehmeier, L. (2019). Method of detecting a jamming transmitter affecting a
communication user equipment. U.S. Patent No. 10,263,726. Washington, DC: U.S. Patent and
Trademark Office.
[35] Kurhila, M., &Torvinen, M. (2014). Base station. United State Patent, 203423, A1.
[36] Shepard, C., Yu, H., Anand, N., Li, E., Marzetta, T., Yang, R., &Zhong, L. (2012, August).
Argos: Practical many-antenna base stations. In Proceedings of the 18th annual international
conference on Mobile computing and networking (pp. 53-64).
[37] Jover, R. P., &Murynets, I. (2016). U.S. Patent No. 9,295,028. Washington, DC: U.S. Patent
and Trademark Office.
[38] Bereziński, P., Szpyrka, M., Jasiul, B., & Mazur, M. (2016, September). Network anomaly
detection using parameterized entropy.In IFIP International Conference on Computer
Information Systems and Industrial Management (pp. 465-478).Springer, Berlin, Heidelberg.
[39] Behal, S., & Kumar, K. (2017). Detection of DDoS attacks and flash events using novel
information theory metrics. Computer Networks, 116, 96-110.
[40] Waskita, A. A., Suhartanto, H., &Handoko, L. T. (2016, October). A performance study of
anomaly detection using entropy method.In 2016 International Conference on Computer,
Control, Informatics and its Applications (IC3INA) (pp. 137-140). IEEE.
[41] Spuhler, M., Giustiniano, D., Lenders, V., Wilhelm, M., & Schmitt, J. B. (2014). Detection
of reactive jamming in DSSS-based wireless communications. IEEE Transactions on Wireless
Communications, 13(3), 1593-1603.
12. [42] Vijayakumar, K. P., Ganeshkumar, P., Anandaraj, M., Selvaraj, K., &Sivakumar, P. (2018).
Fuzzy logic–based jamming detection algorithm for cluster-based wireless sensor network.
International Journal of Communication Systems, 31(10), e3567.
[43] Hamamoto, A. H., Carvalho, L. F., Sampaio, L. D. H., Abrão, T., &ProençaJr, M. L. (2018).
Network anomaly detection system using genetic algorithm and fuzzy logic. Expert Systems
with Applications, 92, 390-402.
[44] Khan, M. A., Khan, S., Shams, B., &Lloret, J. (2016). Distributed flood attack detection
mechanism using artificial neural network in wireless mesh networks. Security and
Communication Networks, 9(15), 2715-2729.
[45] Rappaport, T. S. (2006). Wireless communications: principles and practice (Vol. 2). New
Jersey: prentice hall PTR.
[46] Lin, L., So, H. C., & Chan, Y. T. (2013). Accurate and simple source localization using
differential received signal strength. Digital Signal Processing, 23(3), 736-743.
13. CORRELATION BASED FEATURE SELECTION (CFS) TECHNIQUE TO
PREDICT STUDENT PERFROMANCE
Mital Doshi 1
, Dr.Setu K Chaturvedi, Ph.D 2
1
Mtech. Research Scholar Technocrats Institute of Technology Bhopal, India
2
Professor & HOD (Dept. of CSE) Technocrats Institute of Technology Bhopal, India
Abstract
Education data mining is an emerging stream which helps in mining academic data for solving
various types of problems. One of the problems is the selection of a proper academic track. The
admission of a student in engineering college depends on many factors. In this paper we have
tried to implement a classification technique to assist students in predicting their success in
admission in an engineering stream.We have analyzed the data set containing information about
student’s academic as well as sociodemographic variables, with attributes such as family
pressure, interest, gender, XII marks and CET rank in entrance examinations and historical data
of previous batch of students. Feature selection is a process for removing irrelevant and
redundant features which will help improve the predictive accuracy of classifiers. In this paper
first we have used feature selection attribute algorithms Chi-square.InfoGain, and GainRatio to
predict the relevant features. Then we have applied fast correlation base filter on given features.
Later classification is done using NBTree, MultilayerPerceptron, NaiveBayes and Instance based
–K- nearest neighbor. Results showed reduction in computational cost and time and increase in
predictive accuracy for the student model
Keywords:
Chi-square, Correlation feature selection, IBK, Infogain, Gainratio, Multilayer perceptron,
NaiveBayes, NBTree
Orginal Source URL: http://airccse.org/journal/cnc/6314cnc15.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] Ladha L. and Deepa T., "Feature Selection Methods and Algorithms", International Journal
on Computer Science and Engineering (IJCSE), 2011.
[2] R. Kohavi. “Scaling Up the Accuracy of Naive-Bayes Classifiers: a Decision-Tree Hybrid”
Proceedings of the Second International Conference on Knowledge Discovery and Data Mining,
1996
14. [3] Baker, R.S.J.D. (2010). Data Mining for Education. In B. McGaw, P. Peterson, E. Baker
(eds.), International Encyclopaedia of Education (3rd edition), (pp. 112-118). Oxford, UK:
Elsevier
[4] Pathom Pumpuang, Anongnart Srivihok , Prasong Praneetpolgrang, “Comparisons of
Classifier Algorithms: Bayesian Network, C4.5, Decision Forest and NBTree for Course
Registration Planning Model of Undergraduate Students”, 1-4244-2384-2/08/ 2008 IEEE
[5] Miren Tanna, “Decision Support System for Admission in Engineering Colleges based on
Entrance Exam Marks”, IJCA(0975 – 8887) Volume 52– No.11, August 2012
[6] Malaya Dutta Borah, Rajni Jindal, Daya Gupta Ganesh Chandra Deka, “Application of
knowledge based decision technique to predict student enrollment decision”, 978-1-4577-0792-
6/11 2011 IEEE
[7] Qasem A. Al-Radaideh, Ahmad Al Ananbeh, and Emad M. Al-Shawakfa, “A classification
model for predicting the suitable study track for school students”, Vol8
Issue2/IJRRAS_8_2_15.pdf, August 2011
[8] Hany M. Harb1, Malaka A. Moustafa, “Selecting optimal subset of features for student
performance model”, IJCSI Vol. 9, Issue 5, No 1, September 2012, 1694-0814
[9] Lei Yu leiyu,Huan Liu, “Feature Selection for High-Dimensional Data: A Fast Correlation-
Based Filter Solution”, (ICML-2003), Washington DC, 2003.
[10] B. K. Bharadwaj and S. Pal. "Mining Educational Data to Analyze Students' Performance",
International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6,
pp.63-69, 2011.
[11] S. T. Hijazi, and R. S. M. M. Naqvi, "Factors affecting student's performance: A Case of
Private Colleges", Bangladesh e-Journal of Sociology, Vol. 3, No. 1, 2006.
[12] Z. N. Khan, "Scholastic achievement of higher secondary students in science stream",
Journalof Social Sciences, Vol. 1, No. 2, pp. 84-87, 2005.
[13] Z. J. Kovacic, “Early prediction of student success: Mining student enrollment
data”,Proceedings of Informing Science & IT Education Conference 2010
[14] Blum & Langley, 1997; Kohavi &John, 1997
[15] Hall, M. (1999). Correlation based feature selection for machine learning. Doctoral
dissertation, Universityof Waikato, Dept. of Computer Science.
[16] WEKA,http://www.cs.waikato.ac.nz/ml/weka, Last access, 8 April 2008.
15. WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN
MULTIPLE ACCESS ENVIRONMENT
Y. –J. Lee
Department of Technology Education, Korea National University of Education, Cheongju, South
Korea
Abstract
This paper addresses web object size which is one of important performance measures and
affects to service time in multiple access environment. Since packets arrive according to Poission
distribution and web service time has arbitrary distribution, M/G/1 model can be used to describe
the behavior of the web server system. In the time division multiplexing (TDM), we can use
M/D/1 with vacations model, because service time is constant and server may have a vacation.
We derive the mean web object size satisfying the constraint such that mean waiting time by
round-robin scheduling in multiple access environment is equal to the mean queueing delay of
M/D/1 with vacations model in TDM and M/H2/1 model, respectively. Performance evaluation
shows that the mean web object size increases as the link utilization increases at the given
maximum segment size (MSS), but converges on the lower bound when the number of
embedded objects included in a web page is beyond the threshold. Our results can be applied to
the economic design and maintenance of web service.
Keywords:
M/D/1 with vacations, M/H2/1, mean waiting time, multiple web access
Orginal Source URL: http://airccse.org/journal/cnc/6414cnc01.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] S. Ross, Introduction to probability model, Academic press, NewYork, 2010, p. 538, USA.
[2] W. Shi, E. Collins, and V. Karamcheti, “Modeling Object Characteristics of Dynamic Web
Content,” Journal of Parallel and Distributed Computing, Elsevier Science, pp. 963-980, 1998.
[3] R. Khayari, R. Sadre and B. R. Haverkort, “Fitting world-wide web request traces with the
EMalgorithm, Performance Evaluation,” Vol. 52, pp. 175-191, 2003.
[4] A. Riska, V. Diev and E. Smirni, “Efficient fitting of long-tailed data sets into hyper-
exponential distributions,” Proc. of IEEE Global Telecommunications Conference
(GLOBECOM 2002), Vol. 3, pp. 2513-2517, 2002.
16. [5] Y. Lee, “Mean waiting delay for web service perceived by end-user in multiple access
environment,” Natural Science , vol. 2, Natural Science Institute of KNUE, pp. 55-58, 2012.
[6] S. K. Bose, “M/G/1 with vacations,” http://
www.iitg.ernet.in/skbose/qbook/Slide_Set_7.PDF, pp. 1-7, 2002.
[7] N. Tian and Z. G. Zhang, Vacation Queueing Model, Springer Science and Business Media,
pp. 10-11, 2006.
[8] E. Modiano, “Communication systems engineering,” MIT OpenCourseWare,
http://ocw.mit.edu, pp. 1-19, 2009.
[9] S. W. Fuhrmann, “Technical Note—A Note on the M/G/1 Queue with Server Vacations,”
Operations Research, Vol. 32, No. 6, pp. 1368-1373, 1984.
[10] D. Bertsekas and R. Gallager, Data Networks, Prentice Hall, New Jersey, pp. 186-195,
2007.
[11] M. S. Obaidat and N. A. Boudriga, Fundamentals of Performance Evaluation of Computer
and Tele-communication Systems, Wiely, pp. 156-157, 2010.
[12] Y. Lee, “Mean waiting time of an end-user in the multiple web access environment,” Proc.
of the Sixth International Conference on Communication Theory, Reliability, and Quality of
Service (CTRQ-2013), pp. 1-4, 2013.
17. ZIGBEE TECHNOLOGY AND ITS APPLICATION IN WIRELESS HOME
AUTOMATION SYSTEMS: A SURVEY
Thoraya Obaid, HaleemahRashed, Ali Abou-Elnour, Muhammad Rehan, Mussab Muhammad
Saleh, and Mohammed Tarique
Department of Electrical Engineering, Ajman University of Science and Technology P.O. Box 2202,
Fujairah, United Arab Emirates (UAE)
Abstract
Wireless home automation systems have drawn considerable attentions of the researchers for
more than a decade. The major technologies used to implement these systems include Z-Wave,
Insteon, Wavenis, Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based
systems have become very popular because of its low cost and low power consumption. In this
paper ZigBee based wireless home automation systems have been addressed. There are two main
parts of this paper. In the first part a brief introduction of the ZigBee technology has been
presented and in the second part a survey work on the ZigBee based wireless home automation
system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future
opportunities and challenges of the ZigBee based systems have been listed in this paper.
Keywords:
Home automation, ZigBee, Z-Wave, Insteon, Waveins,PAN, voice control, energy management,
assistive homes, industrial automation
Orginal Source URL: http://airccse.org/journal/cnc/6414cnc11.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agrawal, Stefan Saroiu, Collin
Dixon,(2011) ,“Home Automation in the Wild: Challenges and Opportunities”, Proceedings of
ACM CHI Conference on Human Factors o Computing System, May 7-12, Vancouver, BC,
Canada
[2] ABI Research on home automation available at http://www.abirearch.com
[3] Richard Harper, “ Inside the Smart Home”, Springer-Verlag London Limited (2003)
18. [4] Juile A Kietz, Shwetak N. Patel, Brian Jones, Ed Price, Elizabeth D. Mynatt, Greogory A.
Abowd, (2008) “The Georgia Tech aware Home”, The 26th CHI Conference, April 5-10,
Florence, Italy, pp. 3675-3680
[5] TiiuKoskela and Kaosa-vaananen-vainio-Mattila, (2004) “Evolution towards smart home
environments:empirical evaluation of three users interfaces, International Journal of Personal and
Ubiquitous Computing, July, Vol. 8, No. 3-4, pp. 234-240
[6] Daine J. Cook and Sajal K. Das, (2005) “Smart Home Environments: Technology, Protocols,
andapplications”, Wiley series of Parallel and Distributed Computing (kindle Edition, pp. 273-
294
[7] Tom Rodden and Steve Benford,(2003) “ The evolution of buildings and implications for the
design of ubiquitous domestic environments”, Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, April 5-10, Fort Lauderdale, Florida, pp. 9-16
[8] Home security systems, home security products, and home alarm systems available at
http://www.adt.com
[9] W. Keith Edwards, Rebecaa E. Grinter, Ratul Mahajan, and David Wetherall,(2011)“
Advancing thestate of home networking”, Communication of ACM, Vol. 5, No.6, July, pp. 62-
71
[10] Forest and Sullivan, “North American Home Automation Market”, available at
http://www.forest.com/sublib
[11] Intile S.S., (2002) “Designing a home of the future”, IEEE Pervasive Computing, Vol. 1,
No.2, pp. 76- 82
[12] Scott Davidoff, Min Kyung Lee, Charles Yiu, John Zimmerman, and Anind K. Dey,(2006)
“ Principlesof smart home control”, Proceedings of the 8th International Conference on
Ubiquitous Computing, 17-21 September, pp. 19-34.
[13] Carles Gomez and Joseph Paradells,(2010) “Wireless Home Automation Networks: A
survey of Architectural and Technologies”, IEEE Communication Magzine, June, pp. 92-101
[14] A.J. D. Rathnayaka, V.M. Poddar, (2011)“ Evaluation of Wireless Home Automation
Technologies”, Proceedings of the 5th International Conference on Digital Ecosystems and
Technologies, May 31, 2011, Daejeon, Korea, pp. 76-81
[15] Frost and Sullivan, “Innovation and Affordability open up home automation to alarge
audience” available at http://www.frost.com/prod/servlet/press-release-pag?docid=273090581
[16] The Z-Wave technology available at http://www.z-wavealliance.org/technology
19. [17] P. Darbee, “ INSTEON: The Details”, 2005-2013 available at www.insteon.com
[18] http://www.radiocomms.com.au/products/42985-Wavenis-Open-Standard-Alliance
[19] https://www.bluetooth.org [20] http://www.wi-fi.org/ [21] https://www.zigbee.org/
[22] The IEEE 802.15.4 standard available at
http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf
[23] IPv6 over Low power WPAN (6lowpan) available at http://datatracker.ietf.org/wg/6lowpan/
[24] http://www.enocean-alliance.org/en/home/
[25] http://www.thetrackit.com/library/UWB%20Defin.pdf
[26] Dechuan Chen and MeifangWabg,(2006) “A home security ZigBee network for remote
monitoring application”, Proceedings of IET International Conference on Wireless, Mobile, and
Multimedia networks”, November 6-9, Hangzhou , China, pp. 1-4
[27] ManaseePatil and S.R.N. Reddy, (2013) “Design and Implementation of Home/Office
Automation System based on Wireless Technologies”, International Journal of Computer
Application, Vol. 69,No.6, October , pp. 19-22
[28] V. Sathya Narayanan1 and S. Gayathri, “Design of Wireless Home automation and security
system using PIC Microcontroller”, International Journal of Computer Applications in
Engineering Sciences, Vol. 3, special issue, pp. 135-140
[29] Woo-Choo Park and Myung-Hyun Yoon, (2006)“ The Implementation of Indoor Location
System to Control ZigBee Home Network”, Proceedings of International Joint Conference
SICR-ICASE”, October 18-21, Busan, South Korea, pp. 2158-2161
[30] Kawamoto, R., Emon , T., Sakata, S., and Youasa, K., (2007)“ Energy efficient sensor
control scheme for Home Networks based on DLNA-ZigBee Gateway Architecture”,
Proceedings of the First International Global Information Infrastructure Symposium, July 2-6,
2007, Marrakech, Morocco, pp. 73-79
[31] Zhang Shunyang, Xu Du, Jiang Yongping,() Wang Riming, “ Realization of Home Remote
Controlnetworks based on ZigBee”, Proceedings of the 8th International Conference on
Electronic Measurements and Instrumentations, August 16-18, Xiang, China, pp. 4-344-4-348
[32] Jan Hou, Wu Cang dong, Zhongjia Yuan, Jiyuan Tan, “ Research of Intelligent Home
Security Surveillance System based on ZigBee”, Proceedings of the Initial Symposium on
Intelligent Information Technology Application Workshops, December 21-22, Shanghai, pp.
554-557
20. [33] Jianfeng Wu, and Hubin Qin, (2008)“ The deisgn of wireless intelligent home system based
on ZigBee”, Proceedings of the 11th IEEE International Conference on Communication
Technology, November 11-12, HagZhau, pp. 73-76
[34] Chunglong Zhang, Min Zhang, Young Sheng Su, and Weillian Wang, (2012) “ Smart home
design based on ZigBee wireless sensor network”, Proceedings of the 7th International ICST
Conference on Communications and networking, Kun Ming, pp. 463-466
[35] Jui-Yu Chang, Tao-Yuan, Min-Hsing Hung, and Yen-Wei Chang, (2007) “A ZigBee based
Power Monitoring System with Direct Load Control Capabilities”, Proceedings of IEEE
International Conference on Networking, Sensing, and Control, April 15-17, London, 2007, pp.
895-900
[36] Ying-Wen Bai and Chi-Huang Hang, “ Remote Power ON/OFF control and current
measurementfor home electric outlets based on a low-power embedded board and ZigBee
Communication”, Proceedings of IEEE International Symposium on Consumer Electronics,
April 14-16, Vilamoura, pp.1-4
[37] Jin Sung Byum, BoungjuJeon, Junyoung Noh, and Youngil Kim, “ An Intelligent self-
adjusting sensor for smart home services based on ZigBee Communiation”, IEEE Transaction on
Consumer Eletronics, Vol. 58, No. 3, pp. 799-802
[38] Chihhsiong Shih and Bwo-cheng Liang, “ A model driven software framework for ZigBee
based energy saving systems”, Proceedings of the 3rd International Conference on Intelligent
Systems, modeling and Simulation, February 8-10, Kota Kinabaiu, pp. 487-492
[39] Karia Deepak, JaypalBavisker, Raj Makwana and PanchatNiraj,(2013) “ Performance
analysis of ZigBee based load control and power monitoring system”, Proceedings of the
InternationalConference on Advances in Computing, Communications, and Informatics,
Myshore, August, 25, 2013, pp. 1779- 1484.
[40] Jieming Zhu, Xuecai, Yucang Yang, and Hang Li, (2010)“ Developing a voice control
system forZigBee based home automation”, Proceedings of IEEE International Conference on
network Infrastructure and Digital Content, September 24-26, Beijing, 2010, pp. 7737-741
[41] Y.B. Krishna and S. Nagendram,(2012)“ ZigBee Based Voice Control System for Smart
Home”, International Journal on Computer Technology and Applications, Vol. 3, no. 1 , pp. 163-
168
[42] Gananasekar, A.K., Jayarelu, P., and V. Nagrajan,(2012) “Speech recognition based
wireless automation of home with fault identification for physically challenged”, Proceedings of
International Conference on Communications and Signal Processing, April 4-5 2012, Chennai,
pp. 128- 132
21. [43] Al Shueili, H. and Sen Gupta G, Mukhopadhyaya, (2001)“ Voice recognition based wireless
home automation system”, Proceedings of the International Conference on Mechatronics , May
17-19, Kualalumpur, pp. 1-6
[44] Dhawan S. Thakur and Aditi Sharma,(2013)” Voice Recognition Wireless Home
Automation System based on ZigBee”IOSR Journal of Electronic and Communication
Engineering, Vol. 6, No. 1 May-June 2013, pp. 65-75.
[45] MitaliPatil, AshwiniBedare, and VarshaPacharne,(2013) “The Design and Implementation
of VoiceControlled Wireless Intelligent Home Automation System Based on ZigBee”,
International Journal of Advanced Research in Computer Science and Software Engineering,
Vol. 3, No. 4, April 2013, pp. 307-310
[46] T. Kirankumar, and B. Bhavani,(2013) ” A Sustainable Automated System for Elderly
People Using Voice Recognition and Touch Screen Technology”, International Journal of
Science andResearch (IJSR), Vol. 2, No. 8, August 2013, pp. 265-267
[47] Y.Usha Devi,(2012) “Wireless Home Automation System Using ZigBee”, International
Journal of Scientific & Engineering Research,Volume 3, Issue 8, August, 2012, pp. 1-5
[48] http://www.zigbee.org/About/FAQ.aspx
[49] Rathod K., Parikh, N., and Shah, V.,(2012) “Wireless automation using ZigBee protocols”,
Proceedings of the 9th International Conference on Wireless and Optical Communication,
lndere, September 20-22, 2012, pp.1-5
[50] http://www.skyworksinc.com/downloads/press_room/published_articles/
Microwave_Journal_082009.pdf
[51] http://www.engineerlive.com/content/19359
[52] Simek, M., Fuchs, M, Mraz, L., and Morvek, P.,(2011) “Measurement of LowPAN Network
coexistence with Home Microwave Appliances in Laboratory and Home Environments”,
Proceedings of International Conference on Broadband and Wireless Computing, October 26-28,
Bercelona, pp. 292-299
[53] Khusvinder Gill, Shuang-Hua Yang, Fang Yao, and Xin Lu, (2009) “A ZigBee-Based
Home Automation System”, IEEE Transaction on Consumer Electronics”, Vol. 55, No. 2, May
2009, pp. 422- 430
[54] Fei Ding, Guangming Song, Jianing Li, and Higuo Song, (2008) “ A ZigBee Based Mesh
Network forHome Control”, Proceedings of International Workshop on Geoscience and Remote
Sensing”, Shanghai, Vol. 1, pp. 744-740
22. [55] Cui Chenguyi, Zhao Guannan, and Jin Mingle,(2010) “ A ZigBee based embedded remote
control System”, Proceedings of the 2nd International Conference on Signal Processing Systems,
5-7 July, Dalian, pp. v3-373-376
[56] NausheenBelim, HarshadaBhambure, Priyanka Kumbhar, and SimranjitTuteja,(2013)
“Automate and Secure Your Home Using Zigbee Technology”, International Journal of
Innovative Research in Computer and Communication Engineering, Vol. 1, No. 1, March 2013,
pp. 63-66
[57] Meng-Shiuan Pan, Chia-Hung Tsai, Yu-Chee Tseng,(2009) “The Orphan Problem in
ZigBee WirelessNetworks”, IEEE Transaction of Mobile Computing,November 2009, Vol. 8 ,
No. 11, pp. 1573-1584
[58] Xiu-Wei Yang, Jinan, China ; Yuan Xu ; Shu-Bo Qiu,(2011) “A Solution of Orphan
Problem in ZigBee Tree Network”, Proceedings on the 7th International Conference on Wireless
Communication, Networking and Mobile Computing, September 2011, Wuhan, pp. 1-4
[59] Michael Varhola and Milos Drutorvsky,(2007) “ZigBee Based Home Automation Wireless
Sensor Networks”,ActaElectrotechnica et Informatics, Vol. 7, No. 4, 2007, pp. 1-8
[60] Napolean A., Karthik K., Kamalakannan M., Amarnath M., Nidhin A., (2013)
”Implementation of ZigBee based Home Automation System Using Voice Control”,
International Journal of Engineering Research and Technology, Vol. 2, No. 5, May, pp. 723-733
23. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1
and Yasser Alharbi 2
1
College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia
2
College of Computer and Information Science, Computer Engineering Department, King Saud
University, Riyadh, Saudi Arabia
Abstract
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages.
The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
Keywords:
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
Orginal Source URL: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volime Link: http://airccse.org/journal/ijc2020.html
References
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,”
vol. 7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing
detection schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based
phishing detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent
Information Hiding and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
24. [5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based
approaches,” Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,”
Eurasip J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page
polymorphism: An image layout analysis approach,” in Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in
Bioinformatics), 2009, doi: 10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016,
doi: 10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd
Int. Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for
phishing detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to
Detect Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing
with the combination of local and global features,” in Proceedings - 2014 IEEE 13th
International Conference on Trust, Security and Privacy in Computing and Communications,
TrustCom 2014, 2015, doi: 10.1109/TrustCom.2014.28.
[15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based
approach for detecting phishing pages,” in Proceedings of the 3rd International Conference on
Security and Privacy in Communication Networks, SecureComm, 2007, doi:
10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using
similarity in fundamental visual features,” in Proceedings - 5th International Conference on
Intelligent Networking and Collaborative Systems, INCoS 2013, 2013, doi:
10.1109/INCoS.2013.151.
25. [17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-
phishing: A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi:
10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc.
4th Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based
detection and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161,
2018, doi: 10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM
Malicious webpages detection algorithm based on convolutional neural network and independent
recurrent neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi:
10.1007/s10489-019-01433- 4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM
and similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018,
no. Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation
with Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov.
Clouds, Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
26. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning
approaches to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3,
pp. 1333–1343, 2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing
detection from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi:
10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional
Neural Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to
Recognize Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012,
doi: 10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional
neural network and long short-term memory for phishing detection,” 2019 13th Int. Conf.
Software, Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
27. A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS
BASED ON TRAFFIC PRIORITY IN WIRELESS BODY AREA
NETWORKS
Sabin Bhandari and Sangman Moh
Department of Computer Engineering, Chosun University, Gwangju, South Korea
Abstract
In a wireless body area network (WBAN), wireless biomedical sensors are placed around, on, or
inside the human body. Given specific requirements, WBANs can significantly improve
healthcare, diagnostic monitoring, and other medical services. However, the existing standards
such as IEEE 802.11 and IEEE 802.15.4 have some limitations to meet all the requirements of
WBANs. Many medium access control (MAC) protocols have been studied so far, most of which
are derived from the IEEE 802.15.4 superframe structure with some improvements and
adjustments. However, the MAC protocols do not provide the required quality of service (QoS)
for various types of traffic in a WBAN. In this paper, a traffic-aware MAC (TA-MAC) protocol
for WBANs is proposed, in which time slots are dynamically allocated on the basis of traffic
priority, providing the required QoS. According to the performance evaluation results, the
proposed TA-MAC is better than IEEE 802.15.4 MAC and the conventional priority-based MAC
in terms of transmission time, system throughput, energy efficiency, and collision ratio.
Keywords:
Wireless body area network; Medium access control, Energy efficiency; Quality of service;
Traffic priority; IEEE 802.15.4
Orginal Source URL: https://aircconline.com/ijcnc/V11N4/11419cnc02.pdf
Volime Link: http://airccse.org/journal/ijc2019.html
References
[1] D. Fernandes, A. G. Ferreira, R. Abrishambaf, J. Mendes, andJ. Cabral, (2018) “Survey and
taxonomy of transmissions power control mechanisms for wireless body area networks,” IEEE
Communications Surveys and Tutorials, vol. 20, no. 2, pp. 1292-1328
[2] IEEE, (2006) “IEEE Std.802.15.4: Wireless medium access control (MAC) and physical
layer (PHY) specifications for low data rate wireless personal area networks (WPAN),”
Piscataway, NJ, USA
[3] X. Yang, L. Wang, and Z. Zhang, (2018) “Wireless body area networks MAC protocol for
energy efficiency and extending lifetime,” IEEE Sensors Letters, vol. 2, no. 1, pp. 1-4
28. [4] B. Liu, Z. Yan, and C. W. Chen, (2017) “Medium access control for wireless body area
networks with QoS provisioning and energy efficient design,” IEEE Transactions on Mobile
Computing, vol. 16, no. 2, pp. 422-434
[5] S. Ullah, M. Chen, and K. Kwak, (2012) “Throughput and delay analysis of IEEE 802.15.6
based CSMA/CA protocol,” Journal of Medical Systems, vol. 36, no. 6, pp. 3875-3891
[6] S. Bhandari and S. Moh, (2015) “A survey of MAC Protocols for cognitive radio body area
networks,” Sensors, vol. 15, pp. 9189-9209
[7] E. Kartsakli, A. Lalos, A. Antonopoulos, S. Tennina, M. Renzo, L. Alonso, and C.
Verikoukis, (2014) “A survey on M2M systems for mHealth: A wireless communications
perspective,” Sensors, vol. 14, pp. 18009-18052
[8] R. Cavallari, F. Martelli, R. Rosini, C. Buratti, and R. Verdone, (2014) “A survey on wireless
body area networks: Technologies and design challenges,” IEEE Communications Surveys &
Tutorials, vol. 16, pp. 1635-1657
[9] T. Le and S. Moh, (2015) “Interference mitigation schemes for wireless body area sensor
networks: A comparative survey,” Sensors, vol. 15, pp. 13805-18838
[10] S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, (2003) “Analysis of IEEE
802.11e for QoS support in wireless LANs,” IEEE Wireless Communications, vol. 10, No. 3, pp.
40-50
[11] N. F. Timmons and W. G. Scanlon, (2004) “Analysis of the performance of IEEE 802.15.4
for medical sensor body area networking,” in Proc. of 1st Annual IEEE Communications Society
Conference on Sensor and Ad Hoc Communications and Networks, pp. 16-24
[12] T. Falck, J. Espina, J. P. Ebert, and D. Dietterle, (2006) “BASUMA – The sixth sense for
chronically ill patients,” in Proc. of International Workshop on Wearable and Implantable Body
Sensor Networks, pp. 1-6
[13] G. Fang and E. Dutkiewicz, (2009) “BodyMAC: Energy efficient TDMA-based MAC
protocol for Wireless Body Area Network,” in Proc. of 9th International Symposium on
Communications and Information Technology, pp. 1455-1459
[14] Z. Yan and B. Liu, (2011) “A context aware MAC protocol for medical wireless body area
network,” in Proc. of 7th Int. Wireless Communication and Mobile Computing Conf. (IWCMC
2011), pp. 2133- 2138
[15] L. Huaming and T. Jindong, (2010) “Heartbeat-driven medium-access control for body
sensor networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 1,
pp. 44-51
29. [16] C. Li, L. Wang, J. Li, B. Zhen, H.-B. Li, and R. Kohno, (2009) “Scalable and robust
medium access control protocol in wireless body area networks,” in Proc. of IEEE 20th
International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2127-
2131
[17] W. Lee, S. H. Rhee, Y. Kim, and H. Lee, (2009) “An efficient multi-channel management
protocol for wireless body area networks,” in Proc. of International Conference on Information
Networking, pp.1-5
[18] I. Anjum, N. Alam, M. A. Razzaque, M. Mehedi Hassan, and A. Alamri, (2013) “Traffic
priority and load adaptive mac protocol for qos provisioning in body sensor networks,”
International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-9
[19] K. S. Kwak and S. Ullah, (2010) “A traffic-adaptive MAC protocol for WBAN,” in Proc. of
IEEE GLOBECOM Workshops, pp. 1286-1289
[20] O. Md. Rahman, C. S. Hong, S. Lee, and Y.-C. Bang, (2011) “ATLAS: A traffic load aware
sensor MAC design for collaborative body area sensor networks,” Sensors, vol. 11, no.12, pp.
11560-11580
[21] M. M. Alam, O. Berder, D. Menard, and O. Sentieys, (2012) “TAD-MAC: traffic-aware
dynamic MAC protocol for wireless body area sensor networks,” IEEE Journal on Emerging and
Selected Topics in Circuits and Systems, vol. 2, no. 1, pp. 109-119
[22] B. Kim and J. Cho, (2012) “A novel priority-based channel access algorithm for contention-
based MAC protocol in WBANs,” in Proc. of 6th International Conference on Ubiquitous
Information Management and Communication (ICUIMC 2012), pp. 1-5
[23] S. Ullah, M. Imran, and M. Alnuem, (2014) “A hybrid and secure priority-guaranteed MAC
protocol for wireless body area network,” International Journal of Distributed Sensor Networks,
vol. 2014, pp. 1-7
[24] C. Li, B. Hao, K. Zhang, Y. Liu, and J. Li, (2011) “A novel medium access control protocol
with low delay and traffic adaptivity for wireless body area networks,” Journal of Medical
Systems, pp. 1265- 1275
[25] S. Jin, Z. Weixia, and Z. Zheng, (2013) “Priority-based adaptive timeslot allocation scheme
for wireless body area network,” in Proc. of 13th International Symposium on Communications
and Information Technologies, pp. 609-614
[26] Y. Zhang and G. Dolmans, (2010) “Priority-guaranteed MAC protocol for emerging
wireless body area networks,” Annals of Telecommunications, vol. 66, pp. 229-241
30. [27] X. Liang and I. Balasingham, (2007) “Performance analysis of the IEEE 802.15.4 based
ECG monitoring network,” in Proc. of 7th International Conferences on Wireless and Optical
Communications, pp. 99-104
[28] S. Bhandari, K. Singh, and S. Moh, (2017) “Traffic-Aware Medium Access Control
Protocol for Wireless Body Area Networks,” in Proc. of InfoWare 2017 Conference, pp. 1-6
31. INTRUSION PREVENTION/INTRUSION DETECTION SYSTEM
(IPS/IDS) FOR WIFI NETWORKS
Michal Korčák1
and Jaroslav Lámer2
and František Jakab3
1,2,3
Department of Computer and Informatics, Technical University of Košice, TUKE Košice,
Slovakia
Abstract
The nature of wireless networks itself created new vulnerabilities that in the classical wired
networks do not exist. This results in an evolutional requirement to implement new sophisticated
security mechanism in form of Intrusion Detection and Prevention Systems. This paper deals
with security issues of small office and home office wireless networks. The goal of our work is
to design and evaluate wireless IDPS with use of packet injection method. Decrease of attacker’s
traffic by 95% was observed when compared to attacker’s traffic without deployment of
proposed IDPS system.
Keywords:
Deauthentification, Intrusion detection, Intrusion prevention, Packet injection, WiFi
Orginal Source URL: http://airccse.org/journal/cnc/6414cnc07.pdf
Volime Link: http://airccse.org/journal/ijc2014.html
References
[1] Henry, Paul & Luo, Hui, (2002) “WiFi: what's next?”. Communications Magazine, IEEE,
40.12: 66- 72.
[2] Tews, Erik & Beck, Martin, (2009) “Practical attacks against WEP and WPA” In:
Proceedings of the second ACM conference on Wireless network security. ACM, p. 79-86.
[3] Gounaris, Georgios, (2014) “WiFi security and testbed implementation for WEP/WPA
cracking demonstration”.
[4] L. T. Heberlein & K. N. Levitt & B. Mukherjee, (1991) “A Method To Detect Intrusive
Activity in a Networked Environment”. In: 14th National Computer Security Conference.
Washington, D.C.: National Institute of Standards and Technology, National Computer Security
Center, pp. 362-371
[5] Karen, Scarfone & Peter Mell, (2007) “Guide To Intrusion Detection And Prevention
Systems (IDPS)”. Washington, D.C.: National Institute of Standards and Technology, Special
Publication 800- 94, 128 p.
32. [6] Michael Rash, (2007) “Linux Firewalls - Attack Detection And Response With Iptables”,
Psad And Fwsnort. San Francisco: No Starch Press, 388 p.
[7] Allen, Lee (2012) “Advanced Penetration Testing for Highly--Secured Environments: The
Ultimate Security Guide”. Birmingham: Packt Publishing Ltd., 414p.
[8] “Linux Wireless - Hostapd Linux Documentation Page”. [online]. [cit. 14. April. 2014].
Available online: .
[9] KAZIENKO, Przemyslaw; DOROSZ, Piotr. Intrusion detection systems (IDS) Part 2-
Classification; methods; techniques. WindowsSecurity. com, 2004.
[10] CARL, Glenn, et al. Denial-of-service attack-detection techniques. Internet Computing,
IEEE, 2006, 10.1: 82-89.
33. ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL
CLUSTERING METHOD IN WIRELESS SENSOR NETWORK
Tran Cong Hung1
and Ly Quoc Hung2
1
Posts and Telecommunications Institute of Technology
2
Ho Chi Minh Technical and Economic College
Abstract
In the traditional clustering routing protocol of wireless sensor network, LEACH protocol (Low
Energy Adaptive Clustering Hierarchy) is considered to have many outstanding advantages in
the implementation of the hierarchy according to low energy adaptive cluster to collect and
distribute the data to the base station. The main objective of LEACH is: To prolong life time of
the network, reduce the energy consumption by each node, using the data concentration to reduce
bulletins in the network. However, in the case of large network, the distance from the nodes to
the base station is very different. Therefore, the energy consumption when becoming the host
node is very different but LEACH is not based on the remaining energy to choose the host node,
which is based on the number of times to become the host node in the previous rounds. This
makes the nodes far away from the base station lose power sooner. In this paper, we give a new
routing protocol based on the LEACH protocol in order to improve operating time of sensor
network by considering energy issues and distance in selecting the cluster-head (CH), at that
time the nodes with high energy and near the base station (BS) will have a greater probability of
becoming the cluster-head than the those in far and with lower energy.
Keywords:
LEACH, Life-time, Energy efficient, WSN, Matlab.
Orginal Source URL: https://aircconline.com/ijcnc/V8N5/8516cnc04.pdf
Volime Link: http://airccse.org/journal/ijc2016.html
References
[1] Trịnh Lương Miên (2014), "Tổng quan về mạng cảm biến không dây", Tạp chí tự động hóa
ngày nay, Số 157
[2] TS. Lê Nhật Thăng, and TS. Nguyễn Quý Sỹ (2007), "Các kỹ thuật phân nhóm trong các
mạng cảm biến vô tuyến", Tạp chí Bưu chính viễn thông, Số 301
[3] K. Sohraby, and D. Minoli and T Znati (2007), "Wireless Sensor Network Technology,
Protocol and Application" (John Wiley & Sons Ltd, 2007)
34. [4] Charka Panditharathne and Soumya Jyoti Sen (2009), "Energy Efficient Communication
Protocols for Wireless Sensor Networks"
[5] T. N. Qureshi, N. Javaid, A. H. Khan, A. Iqbal, E. Akhtar, and M. Ishfaq (2013), "Balanced
Energy Efficient Network Integrated Super Heterogenous Protocol for Wireless Sensor
Networks"
[6] W. B. Heinzelman, and A. P. Chandrakasan and H. Balakrishnan (2002), "An application-
specific protocol architecture for wireless microsensor networks", IEEE Transactions on
Wireless Communications", Vol 1, pp. 660-700
[7] Callaway, and Edgar H (2004), "Wireless Sensor Networks—Architectures and Protocols"
(CRC Press Company, 2004)
[8] W. Xinhua, and W. Sheng (2010), "Performance Comparison of LEACH and LEACH-C
Protocols by NS2", Ninth International Symposium on Distributed Computing and Applications
to Business"
[9] W R Heinzelman, and A P Chandrakasan and H Balakrishnan (2000), "Energy efficient
communication protocol for wireless microsensor networks"
[10] Alakesh Braman, and Umapathi G. R (2014), "A Comparative Study on Advances in
LEACH Routing Protocol for Wireless Sensor Networks: A survey.", Volume 3
[11] Jennifer Yick, Biswanath Mukhejee, and Dicpak Ghosal (2008), " Wireless sensor network
survey", Computer Networks 52, pp. 2292 2330
[12] Wendi RabinerHeinzelman, AnanthaChandrakasan, and HariBalakrishnan (2005), "Energy-
Efficient Communication Protocol for Wireless Micro-sensor Networks", pp. 79 - 194
[13] HolgerKarl, and AndreasWillig (2005), "Protocols and Architectures for wireless Sensor
Networks" (John Wiley & Sons, 2005)