SlideShare a Scribd company logo
May 2024: Top10
Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY
AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University, Amman,
Jordan
ABSTRACT
The information security has become one of the most significant problems in data communication.
So it becomes an inseparable part of data communication. In order to address this problem,
cryptography and steganography can be combined. This paper proposes a secure communication
system. It employs cryptographic algorithm together with steganography. The jointing of these
techniques provides a robust and strong communication system that able to withstand against
attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide
high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based
steganography is employed to hide the encrypted message in the cover image by modifying the
wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise
ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides
high level of security.
KEYWORDS
Steganography, Cryptography, DWT, Filter bank, PSNR
For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and
Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5,
No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational
System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13,
No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images",
IEEE, 2nd International conference on Computing, Communication and Networking Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using
Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical
Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High
Capacity Image Steganography Technique", Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE
International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through
Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International
Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based
on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference
for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia
Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International Conference
on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography",
IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using
Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol.
3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and
Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden,
Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based
on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
An IDE for Android Mobile Phones with Extended Functionalities Using Best
Developing Methodologies
Sakila Banu1 and Kanakasabapathi Vijayakumar2
1
College of Computer Science and Information Technology, Taif University, Taif, Saudi Arabia
2
Department of Mathematics,Anna University,Chennai,India.
ABSTRACT
Google's Android platform is a widely anticipated open source operating system for mobile phones. The
mobile phone landscape changed with the introduction of smart phones running Android, a platform marketed
by Google. Android phones are the first credible threat to the iPhone market. Google not only target the
consumers of iPhone, it also aimed to win the hearts and minds of mobile application developers. As a Result,
application developers are developing new software’s everyday for Android Smart Phones and are competing
with the previous in Market. But so far there is no Specific IDE developed to create mobile application easily
by just Drag and Drop method to make even the non-programmers to develop application for the smart phones.
This paper presents an IDE with Extended Functionalities for Developing Mobile Applications for Android
Mobile Phones using the Best developing Methodologies. The New IDE comes with the Extended
Functionalities like Executing the created Application, Previewing the Application Created, Roll Back and
Cancel Functions with the newly added Icons like Execute, Preview, Roll Back and Cancel Respectively.
Another important feature of this paper is that the IDE is developed using the Best Developing Methodologies
by presenting the possible methods for developing the IDE using JAVA SWING GUI Builder in Android
ADT plug-in. The developed IDE is tested using the Android Runtime Emulator in Eclipse Framework.
KEYWORDS
IDE-Integrated Development Environment, GUI-Graphical User Interface, ADT-Android
Development Tool.
For More Details: https://airccse.org/journal/cnc/5413cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] Understanding Android Security by Enck, W.; Ongtang, M.; McDaniel, P.; Pennsylvania State Univ.,
University Park, PA
[2] Android: Changing the Mobile Landscap by Margaret Butler from
http://developerlife.com/tutorials/?p=289
[3] Android – How to build a service-enabled Android app – Part 1/3 UI Posted June 4th, 2008 by
Nazmul
[4] Android-An Open Handset Alliance Project. http://code.google.com/android/.
[5] Bloom S.Book, M.Gruhn, V.Hrushchak, R.Kohler, A.(2008). Write Once Run Anywhere. A survey of
Mobile Runtime Environments. Proceedings of the 3rd International Conference On Grid and Pervasive
Computing(GPC2008):132-137
[6] Holzer, A.Ondrus,J.(2009). Trends in Mobile Application Development. Proceedings of the 2nd
International Conference Mobile Wireless Middleware, Operating Systems and Applications(Mobile ware
2009):55-64
[7] http://www.vogella.com/articles/AndroidDragAndDrop/article.html
[8] http://javapapers.com/android/android-drag-and-drop/
[9] http://developer.android.com/guide/topics/ui/drag-drop.html
[10] http://en.wikipedia.org/wiki/App_Inventor_for_Android
[11] JForm Designer from http://www.formdev.com/jformdesigner/
[12] http://beta.appinventor.mit.edu/about/moreinfo/
[13] Jigloo GUI Builder ,http://www.ibm.com/developerworks/opensource/tutorials/
DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator
tool. Bangalore, 2011. ISBN 9780769546186.
R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-sourcemulticast routing
protocol in mobile ad hoc networks, International Journal of Computer
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to
Ensure Confidentiality, Authenticity and Non-Repudiation
Ritesh Mukherjee1, Anirban Goswami2, Soumit Chowdhury3 and Nabin Ghoshal4, 1Centre for
Development of Advanced Computing, India, 2Techno Main Salt Lake, India, 3Government
College of Engineering & Ceramic Technology, India, 4University of Kalyani, India
ABSTRACT
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is
integrated with a processing unit and counter arrangement to ensure authenticity and non-repudiation
of the captured images of the intruder before court of law. Ownership claim is justified concocting
confidential data sharing of visual cryptography. Signal quality is retained and unauthorized
tampering of secret data resisted. Entire procedure indulges: Message Digest M is generated using
SHA-2 from the date and time stamp of the acquired image, two shares are generated from MAC
address (K) of the network card and encryption is done using AES involving encoding using
Hamming 1 – bit technique. The cover image is prepared in DCT domain to restrict JPEG
compression. Sensitive data is embedded in restricted areas of DCT transformed image. Extraction
of secret data verifies an intruder. The experimental results prove its efficacy over existing
conventional system.
KEYWORDS
Visual cryptography, share generation, AES, key exchange, image compression.
For More Details: https://aircconline.com/ijcnc/V14N4/14422cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2022.html
REFERENCES
[1] Debasis Mazumdar & Ritesh Mukherjee (2020) “Apparatus for Automated Monitoring of
Facial Images and a process therefor”, US Patent 10,592,727, filed April 21, 2015 and issued
Mar 17, 2020.
[2] Lu C.S. & Liao H.Y.M. (2001) “Multipurpose watermarking for image authentication and
protection”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1579–1592.
[3] Yu G.J., Lu C.S. & Liao H.Y.M. (2001) “Mean quantization-based fragile watermarking for
image authentication”, Optical Engineering, Vol. 40, No. 7, pp. 1396–1408.
[4] Barni M., Bartolini F. & Furon T. (2003) “A general framework for robust watermarking
security”, Signal Processing, Vol. 83, No. 10, pp. 2069–2084.
[5] Lee I.S. & Tsai W.H. (2009) “A new approach to covert communication via PDF Files”,
Signal Processing, Vol. 90, No. 2, pp. 557–565.
[6] Shamir A (1979) “How to share a secret”, Communication of the ACM, Vol.22, No.11, pp.
612–613.
[7] Brabin, D. R. D., Perinbam, J. R. P. & Meganathan, D. (2016) “A block-based reversible
data hiding scheme for digital images using optimal value computation”, Wireless Personal
Communications. DOI: 10.1007/s11277-016-3817-4.
[8] Omnia Abdullah Alharbi, Asia Othman Aljhadli & Azizah Abdul Manaf (2020)“A Robust
Double Layer Steganography Technique Based on DNA Sequences”, The 4th International
Conference on Future Networks and Distributed Systems (ICFNDS), article No.:38, pp.1–5,
https:// doi.org / 10.1145 / 3440749. 3442644.
[9] Sanjay Kumar, Anjana Gupta & Gurjit Singh Walia (2021) “Reversible data hiding: A
contemporary survey of state-of-the-art, opportunities, and challenges”, Applied Intelligence,
Vol.52, issue 7, pp 7373–7406, https://doi.org/10.1007/s10489-021-02789-2.
[10] Cox I J, Kilian J, Leighton T & Shamoon T (1997) “Secure Spread Spectrum Watermarking
for Multimedia”, IEEE Transaction on Image Processing, Vol. 6, No. 12, pp. 1673–1687.
[11] Koch E & Zhao J (1995) “Towards robust and hidden image copyright labeling”,
Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras,
Greece, pp. 452–455.
[12] Hsu C. T. & Wu J. L. (1999) “Hidden Digital Watermarks in Images”, IEEE Trans. On
Image Processing, Vol. 8, No. 1, pp. 58-68.
[13] Langelaar G., Setyawan I. & Lagendijk R.L. (2000) “Watermarking Digital Image and
Video Data”, IEEE Signal Processing Magazine, Vol. 17, pp. 20-43. [14] Lin S. D., Shie S. C.
& Guo J. Y. (2010) “Improving the robustness of DCT based image watermarking against JPEG
compression”, Computer Standards & Interfaces, Vol. 32, pp. 54–60.
[15] Yue T. W. & Chiag S. (2000) “A Neural Network Approach for Visual Cryptography”,
IEEE-INNSENNS International Joint Conference on Neural Networks, Vol.5, pp. 494-499.
[16] Jayeeta Majumder & Chittaranjan Pradhan (2020) “Pixel Value Differencing Based Image
Steganography using AES and SHA-2 Cryptography Method”, International Journal of Recent
Technology and Engineering (IJRTE), Vol. 8, No. 5, pp. 5325-5329.
[17] Roshni Padate & Aamna Patel (2014) “Encryption and Decryption of Text using AES
Algorithm”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4,
No. 5, pp. 883- 886.
[18] M.Pitchaiah, Philemon Daniel & Praveen (2012) “Implementation of Advanced Encryption
StandardAlgorithm”, International Journal of Scientific & Engineering Research, Vol. 3, No. 3,
pp. 1- 6.
[19] Mstafa R J & Elleithy K M (2014) “A Highly Secure Video Steganography using Hamming
Code (7, 4). Systems”, Applications and Technology Conference (LISAT), IEEE.
[20] Varnan C S, Jagan A, Kaur J, Jyoti D & Dr. Rao D S (2011) “Image Quality Assessment
Techniques on Spatial Domain”, International Journal of Computer Science and Technology
(IJCST), Vol. 2, No.3, ISSN: 2229-4333(Print), ISSN: 0976-8491(Online).
[21] Wang Z, Bovik A C, Sheikh H R & Simoncelli E P (2004) “Image Quality Assessment:
From Error Visibility to Structural Similarity”, IEEE Transactions on Image Processing, Vol.13,
No.4.
[22] Kaur G & Kochhar A (2011) “A Steganography Implementation based on LSB and DCT”,
International Journal for Science and Emerging Technologies with Latest Trends, Vol.4, No.1,
pp. 35–41. ISSN No: Online 2250-3641.
[23] S. D. Lin, S. C. Shie & J. Y. Guo (2010) “Improving the robustness of DCT based image
watermarking against JPEG compression”, Computer Standards &Interfaces, Vol. 32, pp. 54–
60.
[24] S. D. Lin & C. F. Chen (2000) “A robust DCT based watermarking for copyright
protection”, IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415–421.
[25] S. D. Lin, S. C. Shie & C. F. Chen (2003) “A DCT based image watermarking with
threshold embedding”, International Journal of Computers and Applications, Vol. 25, No. 2, pp.
130–135, 2003.
[26] Vikash Saxena & J. P. Gupta (2009) “A novel watermarking scheme for JPEG images”,
WSEAS Transactions on Signal Processing, 2009, Vol. 5, No. 2, pp. 74–84, 2009.
[27] Rekha Chaturvedi, Abhay Sharma, N. Hemrajani & D. Goyal (2012) “Analysis of robust
watermarking technique using mid-band dct domain for different image formats”, International
Journal of Scientific and Research Publications, Vol. 2, No. 3, pp. 1–4.
[28] Q. Kang, K. Li, & J. Yang (2014) “A digital watermarking approach based on DCT domain
combining QR code and chaotic theory”, in Eleventh International Conference on Wireless and
Optical Communications Networks (WOCN), pp. 1–7.
[29] Jobin Abraham & Varghese Paul (2016) “A DCT based imperceptible color image
watermarking scheme”, International Journal of Signal Processing, Image Processing, and
Pattern Recognition, Vol. 9, No. 7, pp. 137–146.
[30] Anirban Goswami, Ritesh Mukherjee & Nabin Ghoshal (2017) “Chaotic Visual
Cryptography Based Digitized Document Authentication”, Wireless Personal Communications,
Vol.96, No. 3, pp. 3585– 3605.
[31] Gelar Budiman and Ledya Novamizanti (2015) “White Space Steganography On Text By
Using Lzw-Huffman Double Compression”, International Journal of Computer Networks &
Communications (IJCNC), Vol.7, No.2, pp. 123-136, DOI: 10.5121/ijcnc.2015.7210.
[32] Saraireh, Saleh (2013) “A Secure Data Communication System Using Cryptography and
Steganography (2013)”, International Journal of Computer Networks & Communications
(IJCNC) Vol.5, No.3, pp. 125-137.
VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS
CLUSTERING ALGORITHM
A. M. Riad1
, Ibrahim Elhenawy2
, Ahmed Hassan3
and Nancy Awadallah1
1
Faculty of Computer Science and Information Systems, Mansoura University, Egypt
2
Faculty of Computer Science and Information Systems ,Zagazig University, Egypt
3
Faculty of Engineering Mansoura University , Egypt
ABSTRACT
With the ever increasing amount of new attacks in today’s world the amount of data will keep
increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another
problem with detection of attacks is that they usually isn’t detected until after the attack has taken
place, this makes defending against attacks hard and can easily lead to disclosure of sensitive
information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to
evaluate the performance of an unsupervised learning method for anomaly detection. The results of
the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm
rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and
visualized this result by using TreeView visualization tool .
KEYWORDS
Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView
For More Details: https://airccse.org/journal/cnc/5513cnc14.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
REFERENCES
[1] J. F. Nieves ,"Data Clustering for Anomaly Detection in Network Intrusion Detection "
,Research Alliance in Math and Science , August, pp.1-12, 2009 .
[2] L. Portnoy , E. Eskin , S. Stolfo , " Intrusion detection with unlabeled data using clustering",
In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) ,
Philadelphia , PA,USA ,2001.
[3] E.Eskin, A.Arnold, , M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for
unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data
Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp. 78–100,2002.
[4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias,” Network Intrusion Visualization with
NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration”, IEEE, 2002.
[5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and
Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and
Network Architectures, SAR'05, Batz sur Mer, France, June 2005
[6] P. Ren , Y. Gao , Z. Li , Y. Chen and B. Watson , “IDGraphs: Intrusion Detection and
AnalysisUsing Histographs” ,IEEE , 2005 .
[7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, “Visualization of anomaly detection using
prediction sensitivity”, Proc.of Sicherheit, April 2005, 197- 208.
[8] A. Mitrokotsa, C. Douligeris ,” Detecting Denial of Service Attacks Using Emergent Self-
Organizing Maps” , Signal Processing and Information Technology, 2005. Proceedings of the
Fifth IEEE International Symposium , pp. 375 – 380 ,IEEE,2005.
[9] J. Peng, C. Feng, J.W. Rozenblit , “A Hybrid Intrusion Detection and Visualization System”
, Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International
Symposium and Workshop , , pp. – 506, IEEE ,2006.
[10] X.Cui, J.Beaver, T. Potok and L.Yang , “Visual Mining Intrusion Behaviors by Using
Swarm Technology” , System Sciences (HICSS), 2011 44th Hawaii International Conference ,
pp. 1 – 7, IEEE 2011.
[11] A.Frei, M. Rennhard ,” Histogram Matrix: Log File Visualization for Anomaly Detection”,
IEEE , 2007 .
[12] L. Dongxia , Z. Yongbo ,” An Intrusion Detection System Based on Honeypot Technology”
,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
IEEE, Vol.1,2012 .
[13] M. Jianliang , S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K-
means Cluster Algorithm" , IFITA '09 Proceedings of the 2009 International Forum on
Information , Technology and Applications – Vol.1,pp. 150-152,IEEE ,2009.
[14] B. K. Kumar , A. Bhaskar , “Identifying Network Anomalies Using Clustering Technique
in Weblog Data”, International Journal of Computers & Technology, Vol. 2 No. 3, June, 2012.
[15] S. Akbar , K.Nageswara Rao , J.A.Chandulal ," Intrusion Detection System Methodologies
Based on Data Analysis",International Journal of Computer Applications ,Vol. 5 , No.2 , August
2010.
[16] K.Bharti, S. Shukla, S. Jain ,"Intrusion detection using clustering", IJCCT, Vol.1 , 2010
[17] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface” , Proceedings of
the 4th National Conference; INDIACom, Computing For Nation Development, 2010.
[18] The Third International Knowledge Discovery and Data Mining Tools Competition, May
2002,Available from http://kdd.ics.uci.edu/databases/kddcup99.kddcup99.html.
[19] M. Sabhnani ,G. Serpen, “Application of Machine Learning Algorithms to KDD Intrusion
Detection Dataset within Misuse Detection Context “, In Proceedings of the International
Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003),
Vol. 1, (2003).
[20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar ,“Evaluation of Fuzzy K-Means
And KMeans Clustering Algorithms In Intrusion Detection Systems” , International Journal of
Scientific & Technology Research ,Vol. 1, issue 11, December 2012.
[21] M. E. Elhamahmy, H. N. Elmahdy , I. A. Saroit ,"A New Approach for Evaluating Intrusion
Detection System" , International Journal of Artificial Intelligent Systems and Machine
Learning, Vol. 2, No 11, November 2010 .
[22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based
Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications
31(11):1-7, October 2011.
[23] P. G.Jeya , M. Ravichandran and C. S. Ravichandran ," Efficient Classifier for R2L and
U2R Attacks. International Journal of Computer Applications 45(21):29-32, May 2012 .
[24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion
Detection System with Data Mining", International Journal of Computer Science and Network
Security, VOL. 11 No. 4, April 2011
[25] P. Divya , R. Priya," Clustering Based Feature Selection and Outlier Analysis
",International Journal of Computer Science & Communication Networks, Vol 2(6), pg.647-
652.
[26] C.Ahlberg, B. Shneiderman ,” Visual information seeking: tight coupling of dynamic query
filters with starfield displays” , In proceeding of: Conference on Human Factors in Computing
Systems, CHI 1994, Boston, Massachusetts, USA, pp. 313-317,April 24-28, 1994.
[27] S. Noel , M. Jacobs , P. Kalapa , S. Jajodia “Multiple Coordinated Views for Network
Attack Graphs”, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, 99
[28]http://www.researchgate.net/publication/27521564_The_Information_Mural_A_Techniqu
e_for_ Displaying_and_Navigating_Large_Information_Spaces
[29] http://www.ukessays.com/essays/information-technology/intrusion-detection-system-
methodologiesdata-analysis-information-technology-essay.php
[30] http://dl.acm.org/citation.cfm?id=1106724
[31] http://www.computer.org/csdl/proceedings/vizsec/2005/2782/00/27820005-abs.html
[32] http://dl.acm.org/citation.cfm?id=1106719
[33] Ms. P. K. Karmore and MS. S. T. Bodkhe ,"A Survey on Intrusion in Ad Hoc Networks
and its Detection Measures" , International Journal on Computer Science and Engineering
(IJCSE) ,3(5),pp.1896-1903,May 2011 .
[34] http://bonsai.hgc.jp/~mdehoon/software/cluster/cluster3.pdf - Last visiting at 21.06.2013.
On the Migration of a Large Scale Network from IPv4 to IPv6 Environment
Muhammad Yeasir Arafat1
, Feroz Ahmed2
and M Abdus Sobhan3
Department of Electrical and Electronic Engineering, School of Engineering and Computer
Science, Independent University, Bangladesh
ABSTRACT
This work mainly addresses the design a large scale network using dual stack mechanisms. We
focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address
allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual
stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model
and a true large-scale network atmosphere victimization out there end-to-end activity techniques that
focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6
network. In this paper, we compiled IPv6 address planning in large scale network, performance
statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip
time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower
packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack
network.
KEYWORDS
IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT
For More Details: https://airccse.org/journal/cnc/6214cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Tahir Abdullah, Shahbaz Nazeer, Afzaal Hussain, “NETWORK MIGRATION AND
PERFORMANCE ANALYSIS OF IPv4 AND IPv6”, European Scientific Journal, vol. 8, No.5, 2013
[2] Lefty Valle-Rosado, Lizzie Narváez-Díaz, Cinhtia González-Segura and Victor Chi-Pech,
“Design and Simulation of an IPv6 Network Using Two Transition Mechanisms”, IJCSI
International Journal of Computer Science Issues, Vol.9, No.6, pp: 60-65, Nov. 2012.
[3] Internet Engineering Task Force (IETF) RFC 6052, 3513, 4291, 6104, http://tools.ietf.org/html/
[4] Febby Nur Fatah, Adang Suhendra , M Akbar Marwan , Henki Firdaus Henki Firdaus ,
“Performance Measurements Analysis of Dual Stack IPv4-IPv6”, Proc. of the Second Intl.
Conference on Advances in Information Technology — AIT, 2013..
[5] Y. Wang, S. Ye, and X. Li, “Understanding Current IPv6 Performance: A Measurement Study”,
10th IEEE Symposium on Computer Communications, June 2005.
[6] Cebrail CIFLIKLI, Ali GEZER and Abdullah Tuncay OZSAHIN, “Packet traffic features of IPv6
and IPv4 protocol traffic, Turk”, J Elec Eng & Comp Science, Vol.20, No5, pp: 727-749, 2012
[7] Alex Hinds, Anthony Atojoko, and Shao Ying Zhu, “Evaluation of OSPF and EIGRP Routing
Protocols for IPv6”, International Journal of Future Computer and Communication (IJFCC), Vol.2,
No.4, pp: 287-291, Aug. 2013.
[8] T. Bates, R. Chandra, D. Katz, and Y. Rekhter, “Multiprotocol Extensions for BGP-4,” Internet
Request for Comments, vol. RFC 4760, Jan. 2007.
[9] Ing. Luis Marrone, Lic. Andr´es Barbieri and Mg. Mat ‘as Robles, “TCP Performance - CUBIC,
Vegas & Reno”, JCS&T, Vol.13, No.1, pp:1-8, April 2013
[10] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated”, volume 1, published by
Addisonwisely professional computer series, Pearson Education, 2012
PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI
MODELS AS MQTT SERVERS AND CLIENTS
Faiza Al-Salti1
, N. Alzeidi2
, Khaled Day2
, Abderezak Touzene2
, 1
Sultan Qaboos Comprehensive
Cancer Care and Research Centre, Oman, 2
Sultan Qaboos University, Oman
5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland
ABSTRACT
This paper studies the impact of different localization schemes on the performance of location-based
routing for UWSNs. Particularly, LSWTS and 3DUL localization schemes available in the literature
are used to study their effects on the performance of the ERGR-EMHC routing protocol. First, we
assess the performance of two localization schemes by measuring their localization coverage,
accuracy, control packets overhead, and required localization time. We then study the performance
of the ERGR-EMHC protocol using location information provided by the selected localization
schemes. The results are compared with the performance of the routing protocol when using exact
nodes’ locations. The obtained results show that LSWTS outperforms 3DUL in terms of localization
accuracy by 83% and localization overhead by 70%. In addition, the results indicate that the
localization error has a significant impact on the performance of the routing protocol. For instance,
ERGR-EMHC with LSWTS is better in delivering data packets by an average of 175% compared to
3DUL.
KEYWORDS
Underwater wireless sensor networks (UWSNs), localization, ranging localization methods,
localization error, location-based routing
For More Details: https://aircconline.com/ijcnc/V15N2/15223cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
REFERENCES
[1] Y. Wang, “Three-Dimensional Wireless Sensor Networks: Geometric Approaches for Topology
and Routing Design,” in The Art of Wireless Sensor Networks, H. M. Ammari, Ed. Berlin,
Heidelberg: Springer Berlin Heidelberg, 2014, pp. 367–409.
[2] H. P. Tan, R. Diamant, W. K. G. Seah, and M. Waldmeyer, “A survey of techniques and
challenges in underwater localization,” Ocean Engineering, vol. 38, no. 14–15, pp. 1663–1676,
October 2011, doi: 10.1016/J.OCEANENG.2011.07.017.
[3] F. Al-Salti, N. Alzeidi, and K. Day, “LOCALIZATION SCHEMES FOR UNDERWATER
WIRELESS SENSOR NETWORKS: SURVEY,” International journal of Computer Networks &
Communications, vol. 12, no. 3, pp. 113–130, May 2019.
[4] M. Erol, L. F. M. Vieira, and M. Gerla, “AUV-Aided Localization for Underwater Sensor
Networks,” in International Conference on Wireless Algorithms, Systems and Applications (WASA
2007), 1-3 August 2007, pp. 44–54, Chicago, IL, USA.
[5] M. Beniwal, R. P. Singh, and A. Sangwan, “A Localization Scheme for Underwater Sensor
Networks Without Time Synchronization,” Wireless Personal Communications, vol. 88, no. 3, pp.
537–552, June 2016.
[6] M. Isik and O. Akan, “A three dimensional localization algorithm for underwater acoustic sensor
networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4457–4463,
September 2009.
[7] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility
Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 10, no.
3, pp. 335–348, March 2011.
[8] Y. Zhou, B. Gu, K. Chen, J. Chen, and H. Guan, “An range-free localization scheme for large
scale underwater wireless sensor networks,” Journal of Shanghai Jiaotong University (Science), vol.
14, no. 5, pp. 562–568, October 2009.
[9] J. Luo and L. Fan, “A Two-Phase Time Synchronization-Free Localization Algorithm for
Underwater Sensor Networks,” Sensors, vol. 17, no. 12, p. 726, March 2017.
[10] K. Day, F. Al-Salti, A. Touzene, and N. Alzeidi, “AN EFFICIENT DATA COLLECTION PROTOCOL
FOR UNDERWATER WIRELESS SENSOR NETWORKS,” International Journal of Computer Networks
& Communications (IJCNC), vol. 12, no. 5, pp. 1–15, September 2020, doi: 10.5121/ijcnc.2020.12501.
[11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks,
in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–1221.
[12] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based
Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks,
volume 23, no. 4, pp. 1301–1314, May 2017. International Journal of Computer Networks &
Communications (IJCNC) Vol.15, No.2, March 2023 18
[13] N. Javaid, M. Shah, A. Ahmad, M. Imran, M. Khan, and A. Vasilakos, “An Enhanced Energy
Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks,” Sensors, vol. 16,
no. 4, p. 487, April 2016, doi: 10.3390/s16040487.
[14] F. Al-Salti, N. Alzeidi, K. Day, and A. Touzene, “An efficient and reliable grid-based routing
protocol for UWSNs by exploiting minimum hop count,” Computer Networks, vol. 162, p. 106869,
October 2019.
[15] B. Peng and A. H. Kemp, “Energy-efficient geographic routing in the presence of localization
errors,” Computer Networks, vol. 55, no. 3, pp. 856–872, February 2011.
[16] M. Kadi and I. Alkhayat, “The effect of location errors on location based routing protocols in
wireless sensor networks,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 113–119, March 2015.
[17] R. C. Shah, A. Wolisz, and J. M. Rabaey, “On the performance of geographical routing in the
presence of localization errors,” in IEEE International Conference on Communications, 2005. ICC
2005, 16-20 May 2005, vol. 5, pp. 2979–2985, Seoul, South Korea.
[18] D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on
geographic routing in mobile ad hoc sensor networks: analysis and improvement using mobility
prediction,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 233–245, July 2004.
[19] Erol, L. F. M. Vieira, and M. Gerla, “Localization with Dive’N’Rise (DNR) beacons for
underwater acoustic sensor networks,” in Proceedings of the second workshop on Underwater
networks - WuWNet ’07, 14 September 2007, pp. 97-100, Montreal, Quebec, Canada.
[20] V. Chandrasekhar and W. Seah, “An Area Localization Scheme for Underwater Sensor
Networks,” in OCEANS 2006 - Asia Pacific, 16-19 May 2006, pp. 1–8, Singapore, Singapore.
[21] A. M. Abu-Mahfouz and G. P. Hancke, “ns-2 extension to simulate localization system in
wireless sensor networks,” in IEEE Africon ’11, 13-15 September 2011, pp. 1–7, Livingstone,
Zambia.
[22] M. Erol-Kantarci, S. Oktug, L. Vieira, and M. Gerla, “Performance evaluation of distributed
localization techniques for mobile underwater acoustic sensor networks,” Ad Hoc Networks, vol. 9,
no. 1, pp. 61–72, January 2011.
[23] Z. Zhou, J.-H. Cui, and S. Zhou, “Efficient localization for large-scale underwater sensor
networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 267–279, May 2010.
[24] Z. Qiang, Z. Senlin, and L. Meiqin, “A clock synchronization independent localization scheme for
underwater wireless sensor networks,” in Proceedings of the Eighth ACM International Conference on
Underwater Networks and Systems - WUWNet ’13, 11-13 November 2013, pp. 1–5, Kaohsiung, Taiwan.
[25] F. Al-Salti, N. Alzeidi, K. Day and A. Touzene, “Multiple Sink Placement Strategy for Underwater
Wireless Sensor Networks,” Proceedings of the International Symposium on Networks, Computers and
Communications (ISNCC), 19-21 June 2018, Rome, Italy.
[26] F. Al-Salti, A. N, K. Day, B. Arafeh, and A. Touzene, “Grid Based Priority Routing Protocol for
UWSNs,” International journal of Computer Networks & Communications, vol. 9, no. 6, pp. 01–20,
December 2017, doi: 10.5121/ijcnc.2017.9601.
INTRUSION PREVENTION/INTRUSION DETECTION SYSTEM (IPS/IDS)
FOR WIFI NETWORKS
Michal Korcak, Jaroslav Lamer and Frantisek Jakab, Technical University of Košice, Slovakia
ABSTRACT
The nature of wireless networks itself created new vulnerabilities that in the classical wired networks
do not exist. This results in an evolutional requirement to implement new sophisticated security
mechanism in form of Intrusion Detection and Prevention Systems. This paper deals with security
issues of small office and home office wireless networks. The goal of our work is to design and
evaluate wireless IDPS with use of packet injection method. Decrease of attacker’s traffic by 95%
was observed when compared to attacker’s traffic without deployment of proposed IDPS system.
KEYWORDS
Deauthentification, Intrusion detection, Intrusion prevention, Packet injection, WiFi
For More Details: https://airccse.org/journal/cnc/6414cnc07.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
REFERENCES
[1] Henry, Paul & Luo, Hui, (2002) “WiFi: what's next?”. Communications Magazine, IEEE,
40.12: 66- 72.
[2] Tews, Erik & Beck, Martin, (2009) “Practical attacks against WEP and WPA” In:
Proceedings of the second ACM conference on Wireless network security. ACM, p. 79-86.
[3] Gounaris, Georgios, (2014) “WiFi security and testbed implementation for WEP/WPA
cracking demonstration”.
[4] L. T. Heberlein & K. N. Levitt & B. Mukherjee, (1991) “A Method To Detect Intrusive
Activity in a Networked Environment”. In: 14th National Computer Security Conference.
Washington, D.C.: National Institute of Standards and Technology, National Computer Security
Center, pp. 362-371
[5] Karen, Scarfone & Peter Mell, (2007) “Guide To Intrusion Detection And Prevention
Systems (IDPS)”. Washington, D.C.: National Institute of Standards and Technology, Special
Publication 800- 94, 128 p.
[6] Michael Rash, (2007) “Linux Firewalls - Attack Detection And Response With Iptables”,
Psad And Fwsnort. San Francisco: No Starch Press, 388 p.
[7] Allen, Lee (2012) “Advanced Penetration Testing for Highly--Secured Environments: The
Ultimate Security Guide”. Birmingham: Packt Publishing Ltd., 414p.
[8] “Linux Wireless - Hostapd Linux Documentation Page”. [online]. [cit. 14. April. 2014].
Available online: .
[9] KAZIENKO, Przemyslaw; DOROSZ, Piotr. Intrusion detection systems (IDS) Part 2-
Classification; methods; techniques. WindowsSecurity. com, 2004.
[10] CARL, Glenn, et al. Denial-of-service attack-detection techniques. Internet Computing,
IEEE, 2006, 10.1: 82-89

More Related Content

Similar to May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf

July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
sipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
sipij
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
sipij
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
ijujournal
 
January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering
IJCSEA Journal
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
sipij
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...
Zac Darcy
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
ijwmn
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
IJCNCJournal
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
ijwmn
 
Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...
IJNSA Journal
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
ijujournal
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
AIRCC Publishing Corporation
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
IJCNCJournal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 

Similar to May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf (20)

July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
 
January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...Top downloaded article in academia 2020 - International Journal of Informatio...
Top downloaded article in academia 2020 - International Journal of Informatio...
 
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...
 
8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...8 of the Must-Read Network & Data Communication Articles Published this weeke...
8 of the Must-Read Network & Data Communication Articles Published this weeke...
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 

More from IJCNCJournal

Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
IJCNCJournal
 
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueAnalysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
IJCNCJournal
 
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisOptimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
IJCNCJournal
 
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationAn Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
IJCNCJournal
 
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
IJCNCJournal
 
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
IJCNCJournal
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
IJCNCJournal
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 

More from IJCNCJournal (20)

Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
 
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
 
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueAnalysis and Evolution of SHA-1 Algorithm - Analytical Technique
Analysis and Evolution of SHA-1 Algorithm - Analytical Technique
 
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisOptimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis
 
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationAn Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation
 
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...
 
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...
 
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 

Recently uploaded

Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 

Recently uploaded (20)

Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 

May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf

  • 1. May 2024: Top10 Read Articles in Computer Networks & Communications International Journal of Computer Networks& Communications (IJCNC) http://airccse.org/journal/ijcnc.html (Scopus, ERA Listed, WJCI Indexed) Scopus Cite Score 2022—1.8 ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) Citations, h-index, i10-index
  • 2. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin School of Computer Sciences, Universiti Sains Malaysia, Malaysia ABSTRACT Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life. Commonly, users utilize the technology to track the position of a vehicle or an object of interest. They also use it to safely navigate to the destination of their choice. As a result, there are countless number of GPS based tracking application that has been developed. But, a main recurring issue that exists among these applications are the inaccuracy of the tracking faced by users and this issue has become a rising concern. Most existing research have examined the effects that the inaccuracy of GPS have on users while others identified suitable methods to improve the accuracy of GPS based on one or two factors. The objective of this survey paper is to identify the common factors that affects the accuracy of GPS and identify an effective method which could mitigate or overcome most of those factors. As part of our research, we conducted a thorough examination of the existing factors for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object tracking and disconnection of GPS signal while using an application. As such, most of the respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective of this paper, which is to examine and evaluate existing methods as well as to identify the most effective method that could improve the accuracy of GPS. KEYWORDS GPS, accuracy factors, improve accuracy, global positioning system For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf Volume Link: https://airccse.org/journal/ijc2016.html
  • 3. REFERENCES [1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France. pp. 524-527. [2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on Wireless Networks and Information Systems, Shanghai, China. pp. 294-299. [3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”, Computer, vol.35, no..4, pp. 92-94. [4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China, pp. 94-99. [5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS-96) [6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088. [7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”, IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693. [8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information Technology, pp. 95-101. [9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
  • 4. A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY Saleh Saraireh Department of Communications and Electronic Engineering, Philadelphia University, Amman, Jordan ABSTRACT The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security. KEYWORDS Steganography, Cryptography, DWT, Filter bank, PSNR For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf Volume Link: https://airccse.org/journal/ijc2013.html
  • 5. REFERENCES [1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2. [2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston, London. [3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1. [4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13, No. 5. [5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images", IEEE, 2nd International conference on Computing, Communication and Networking Technologies. [6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical Technologies. [7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High Capacity Image Steganography Technique", Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1. [8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE International Conference on Signal Processing, 2:1568-1571. [9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229. [10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system using Steganography, AES and RSA", IEEE 17th International Symposium for Design and Technology in Electronic Packaging. [11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference for Young Computer Scientists, pp. 647-652. [12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1512-1515. [13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information Content using New Encryption Method and Steganography", IEEE Third International Conference on Digital Information Management. [14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography", IEEE, International Conference on Signal Processing Systems.
  • 6. [15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472. [16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden, Germany. [17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based on integer wavelet transform,” ICNM International Conference on Networking and Media Convergence, pp 111-117.
  • 7. An IDE for Android Mobile Phones with Extended Functionalities Using Best Developing Methodologies Sakila Banu1 and Kanakasabapathi Vijayakumar2 1 College of Computer Science and Information Technology, Taif University, Taif, Saudi Arabia 2 Department of Mathematics,Anna University,Chennai,India. ABSTRACT Google's Android platform is a widely anticipated open source operating system for mobile phones. The mobile phone landscape changed with the introduction of smart phones running Android, a platform marketed by Google. Android phones are the first credible threat to the iPhone market. Google not only target the consumers of iPhone, it also aimed to win the hearts and minds of mobile application developers. As a Result, application developers are developing new software’s everyday for Android Smart Phones and are competing with the previous in Market. But so far there is no Specific IDE developed to create mobile application easily by just Drag and Drop method to make even the non-programmers to develop application for the smart phones. This paper presents an IDE with Extended Functionalities for Developing Mobile Applications for Android Mobile Phones using the Best developing Methodologies. The New IDE comes with the Extended Functionalities like Executing the created Application, Previewing the Application Created, Roll Back and Cancel Functions with the newly added Icons like Execute, Preview, Roll Back and Cancel Respectively. Another important feature of this paper is that the IDE is developed using the Best Developing Methodologies by presenting the possible methods for developing the IDE using JAVA SWING GUI Builder in Android ADT plug-in. The developed IDE is tested using the Android Runtime Emulator in Eclipse Framework. KEYWORDS IDE-Integrated Development Environment, GUI-Graphical User Interface, ADT-Android Development Tool. For More Details: https://airccse.org/journal/cnc/5413cnc11.pdf Volume Link: https://airccse.org/journal/ijc2013.html
  • 8. REFERENCES [1] Understanding Android Security by Enck, W.; Ongtang, M.; McDaniel, P.; Pennsylvania State Univ., University Park, PA [2] Android: Changing the Mobile Landscap by Margaret Butler from http://developerlife.com/tutorials/?p=289 [3] Android – How to build a service-enabled Android app – Part 1/3 UI Posted June 4th, 2008 by Nazmul [4] Android-An Open Handset Alliance Project. http://code.google.com/android/. [5] Bloom S.Book, M.Gruhn, V.Hrushchak, R.Kohler, A.(2008). Write Once Run Anywhere. A survey of Mobile Runtime Environments. Proceedings of the 3rd International Conference On Grid and Pervasive Computing(GPC2008):132-137 [6] Holzer, A.Ondrus,J.(2009). Trends in Mobile Application Development. Proceedings of the 2nd International Conference Mobile Wireless Middleware, Operating Systems and Applications(Mobile ware 2009):55-64 [7] http://www.vogella.com/articles/AndroidDragAndDrop/article.html [8] http://javapapers.com/android/android-drag-and-drop/ [9] http://developer.android.com/guide/topics/ui/drag-drop.html [10] http://en.wikipedia.org/wiki/App_Inventor_for_Android [11] JForm Designer from http://www.formdev.com/jformdesigner/ [12] http://beta.appinventor.mit.edu/about/moreinfo/ [13] Jigloo GUI Builder ,http://www.ibm.com/developerworks/opensource/tutorials/
  • 9. DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3 1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and Informatics, Technical University of Kosice, Slovakia ABSTRACT The article looks into the current state of the art of dynamic routing protocols with respect to their possibilities to react to changes in the Quality of Service when selecting the best route towards a destination network. New options that could leverage information about the ever changing QoS parameters for data communication are analysed and a Cisco Performance Routing solution is described more in detail. The practical part of this work focuses on a design and implementation of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of different data communications flowing through it. The test bed is used in various use cases that were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios. KEYWORDS Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf Volume Link: https://airccse.org/journal/ijc2014.html
  • 10. REFERENCES [1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet Engineering Task Force, 1981. [2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf. [3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date: 25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00. [4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide. Indianapolis: Cisco Press, 2010. ISBN 1587058820. [5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf. [6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I. Indianapolis: Cisco Press, 2006. ISBN 1587052024. [7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209. [8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online] 2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp- te-ext02. [9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013. [Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946. [10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date: 4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco- live. [11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September 2013.] https://learningnetwork.cisco.com/docs/DOC-22910. [12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online] 2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug- articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10. [13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network Emulator tool. Bangalore, 2011. ISBN 9780769546186. R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-sourcemulticast routing protocol in mobile ad hoc networks, International Journal of Computer
  • 11. Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensure Confidentiality, Authenticity and Non-Repudiation Ritesh Mukherjee1, Anirban Goswami2, Soumit Chowdhury3 and Nabin Ghoshal4, 1Centre for Development of Advanced Computing, India, 2Techno Main Salt Lake, India, 3Government College of Engineering & Ceramic Technology, India, 4University of Kalyani, India ABSTRACT The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured images of the intruder before court of law. Ownership claim is justified concocting confidential data sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time stamp of the acquired image, two shares are generated from MAC address (K) of the network card and encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its efficacy over existing conventional system. KEYWORDS Visual cryptography, share generation, AES, key exchange, image compression. For More Details: https://aircconline.com/ijcnc/V14N4/14422cnc07.pdf Volume Link: https://airccse.org/journal/ijc2022.html
  • 12. REFERENCES [1] Debasis Mazumdar & Ritesh Mukherjee (2020) “Apparatus for Automated Monitoring of Facial Images and a process therefor”, US Patent 10,592,727, filed April 21, 2015 and issued Mar 17, 2020. [2] Lu C.S. & Liao H.Y.M. (2001) “Multipurpose watermarking for image authentication and protection”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1579–1592. [3] Yu G.J., Lu C.S. & Liao H.Y.M. (2001) “Mean quantization-based fragile watermarking for image authentication”, Optical Engineering, Vol. 40, No. 7, pp. 1396–1408. [4] Barni M., Bartolini F. & Furon T. (2003) “A general framework for robust watermarking security”, Signal Processing, Vol. 83, No. 10, pp. 2069–2084. [5] Lee I.S. & Tsai W.H. (2009) “A new approach to covert communication via PDF Files”, Signal Processing, Vol. 90, No. 2, pp. 557–565. [6] Shamir A (1979) “How to share a secret”, Communication of the ACM, Vol.22, No.11, pp. 612–613. [7] Brabin, D. R. D., Perinbam, J. R. P. & Meganathan, D. (2016) “A block-based reversible data hiding scheme for digital images using optimal value computation”, Wireless Personal Communications. DOI: 10.1007/s11277-016-3817-4. [8] Omnia Abdullah Alharbi, Asia Othman Aljhadli & Azizah Abdul Manaf (2020)“A Robust Double Layer Steganography Technique Based on DNA Sequences”, The 4th International Conference on Future Networks and Distributed Systems (ICFNDS), article No.:38, pp.1–5, https:// doi.org / 10.1145 / 3440749. 3442644. [9] Sanjay Kumar, Anjana Gupta & Gurjit Singh Walia (2021) “Reversible data hiding: A contemporary survey of state-of-the-art, opportunities, and challenges”, Applied Intelligence, Vol.52, issue 7, pp 7373–7406, https://doi.org/10.1007/s10489-021-02789-2. [10] Cox I J, Kilian J, Leighton T & Shamoon T (1997) “Secure Spread Spectrum Watermarking for Multimedia”, IEEE Transaction on Image Processing, Vol. 6, No. 12, pp. 1673–1687. [11] Koch E & Zhao J (1995) “Towards robust and hidden image copyright labeling”, Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, pp. 452–455. [12] Hsu C. T. & Wu J. L. (1999) “Hidden Digital Watermarks in Images”, IEEE Trans. On Image Processing, Vol. 8, No. 1, pp. 58-68. [13] Langelaar G., Setyawan I. & Lagendijk R.L. (2000) “Watermarking Digital Image and Video Data”, IEEE Signal Processing Magazine, Vol. 17, pp. 20-43. [14] Lin S. D., Shie S. C. & Guo J. Y. (2010) “Improving the robustness of DCT based image watermarking against JPEG
  • 13. compression”, Computer Standards & Interfaces, Vol. 32, pp. 54–60. [15] Yue T. W. & Chiag S. (2000) “A Neural Network Approach for Visual Cryptography”, IEEE-INNSENNS International Joint Conference on Neural Networks, Vol.5, pp. 494-499. [16] Jayeeta Majumder & Chittaranjan Pradhan (2020) “Pixel Value Differencing Based Image Steganography using AES and SHA-2 Cryptography Method”, International Journal of Recent Technology and Engineering (IJRTE), Vol. 8, No. 5, pp. 5325-5329. [17] Roshni Padate & Aamna Patel (2014) “Encryption and Decryption of Text using AES Algorithm”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4, No. 5, pp. 883- 886. [18] M.Pitchaiah, Philemon Daniel & Praveen (2012) “Implementation of Advanced Encryption StandardAlgorithm”, International Journal of Scientific & Engineering Research, Vol. 3, No. 3, pp. 1- 6. [19] Mstafa R J & Elleithy K M (2014) “A Highly Secure Video Steganography using Hamming Code (7, 4). Systems”, Applications and Technology Conference (LISAT), IEEE. [20] Varnan C S, Jagan A, Kaur J, Jyoti D & Dr. Rao D S (2011) “Image Quality Assessment Techniques on Spatial Domain”, International Journal of Computer Science and Technology (IJCST), Vol. 2, No.3, ISSN: 2229-4333(Print), ISSN: 0976-8491(Online). [21] Wang Z, Bovik A C, Sheikh H R & Simoncelli E P (2004) “Image Quality Assessment: From Error Visibility to Structural Similarity”, IEEE Transactions on Image Processing, Vol.13, No.4. [22] Kaur G & Kochhar A (2011) “A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies with Latest Trends, Vol.4, No.1, pp. 35–41. ISSN No: Online 2250-3641. [23] S. D. Lin, S. C. Shie & J. Y. Guo (2010) “Improving the robustness of DCT based image watermarking against JPEG compression”, Computer Standards &Interfaces, Vol. 32, pp. 54– 60. [24] S. D. Lin & C. F. Chen (2000) “A robust DCT based watermarking for copyright protection”, IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415–421. [25] S. D. Lin, S. C. Shie & C. F. Chen (2003) “A DCT based image watermarking with threshold embedding”, International Journal of Computers and Applications, Vol. 25, No. 2, pp. 130–135, 2003. [26] Vikash Saxena & J. P. Gupta (2009) “A novel watermarking scheme for JPEG images”, WSEAS Transactions on Signal Processing, 2009, Vol. 5, No. 2, pp. 74–84, 2009.
  • 14. [27] Rekha Chaturvedi, Abhay Sharma, N. Hemrajani & D. Goyal (2012) “Analysis of robust watermarking technique using mid-band dct domain for different image formats”, International Journal of Scientific and Research Publications, Vol. 2, No. 3, pp. 1–4. [28] Q. Kang, K. Li, & J. Yang (2014) “A digital watermarking approach based on DCT domain combining QR code and chaotic theory”, in Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1–7. [29] Jobin Abraham & Varghese Paul (2016) “A DCT based imperceptible color image watermarking scheme”, International Journal of Signal Processing, Image Processing, and Pattern Recognition, Vol. 9, No. 7, pp. 137–146. [30] Anirban Goswami, Ritesh Mukherjee & Nabin Ghoshal (2017) “Chaotic Visual Cryptography Based Digitized Document Authentication”, Wireless Personal Communications, Vol.96, No. 3, pp. 3585– 3605. [31] Gelar Budiman and Ledya Novamizanti (2015) “White Space Steganography On Text By Using Lzw-Huffman Double Compression”, International Journal of Computer Networks & Communications (IJCNC), Vol.7, No.2, pp. 123-136, DOI: 10.5121/ijcnc.2015.7210. [32] Saraireh, Saleh (2013) “A Secure Data Communication System Using Cryptography and Steganography (2013)”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, pp. 125-137.
  • 15. VISUALIZE NETWORK ANOMALY DETECTION BY USING K-MEANS CLUSTERING ALGORITHM A. M. Riad1 , Ibrahim Elhenawy2 , Ahmed Hassan3 and Nancy Awadallah1 1 Faculty of Computer Science and Information Systems, Mansoura University, Egypt 2 Faculty of Computer Science and Information Systems ,Zagazig University, Egypt 3 Faculty of Engineering Mansoura University , Egypt ABSTRACT With the ever increasing amount of new attacks in today’s world the amount of data will keep increasing, and because of the base-rate fallacy the amount of false alarms will also increase. Another problem with detection of attacks is that they usually isn’t detected until after the attack has taken place, this makes defending against attacks hard and can easily lead to disclosure of sensitive information. In this paper we choose K-means algorithm with the Kdd Cup 1999 network data set to evaluate the performance of an unsupervised learning method for anomaly detection. The results of the evaluation showed that a high detection rate can be achieve while maintaining a low false alarm rate .This paper presents the result of using k-means clustering by applying Cluster 3.0 tool and visualized this result by using TreeView visualization tool . KEYWORDS Intrusion detection, Clustering, K-means, Kdd Cup 99, Cluster 3.0, Visualization, TreeView For More Details: https://airccse.org/journal/cnc/5513cnc14.pdf Volume Link: https://airccse.org/journal/ijc2013.html
  • 16. REFERENCES [1] J. F. Nieves ,"Data Clustering for Anomaly Detection in Network Intrusion Detection " ,Research Alliance in Math and Science , August, pp.1-12, 2009 . [2] L. Portnoy , E. Eskin , S. Stolfo , " Intrusion detection with unlabeled data using clustering", In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) , Philadelphia , PA,USA ,2001. [3] E.Eskin, A.Arnold, , M. Prerau, L.Portnoy, S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data", Applications of Data Mining in Computer Security(2002), Norwell, MA, USA, Dec., pp. 78–100,2002. [4] K. Nyarko, T. Capers, C. Scott, K. Ladeji-Osias,” Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration”, IEEE, 2002. [5] K.Labib, V. R. Vemuri, "Anomaly Detection Using S Language Framework: Clustering and Visualization of Intrusive Attacks on Computer Systems". Fourth Conference on Security and Network Architectures, SAR'05, Batz sur Mer, France, June 2005 [6] P. Ren , Y. Gao , Z. Li , Y. Chen and B. Watson , “IDGraphs: Intrusion Detection and AnalysisUsing Histographs” ,IEEE , 2005 . [7] P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, “Visualization of anomaly detection using prediction sensitivity”, Proc.of Sicherheit, April 2005, 197- 208. [8] A. Mitrokotsa, C. Douligeris ,” Detecting Denial of Service Attacks Using Emergent Self- Organizing Maps” , Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium , pp. 375 – 380 ,IEEE,2005. [9] J. Peng, C. Feng, J.W. Rozenblit , “A Hybrid Intrusion Detection and Visualization System” , Engineering of Computer Based Systems, 2006. ECBS 2006. 13th Annual IEEE International Symposium and Workshop , , pp. – 506, IEEE ,2006. [10] X.Cui, J.Beaver, T. Potok and L.Yang , “Visual Mining Intrusion Behaviors by Using Swarm Technology” , System Sciences (HICSS), 2011 44th Hawaii International Conference , pp. 1 – 7, IEEE 2011. [11] A.Frei, M. Rennhard ,” Histogram Matrix: Log File Visualization for Anomaly Detection”, IEEE , 2007 . [12] L. Dongxia , Z. Yongbo ,” An Intrusion Detection System Based on Honeypot Technology” ,Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on IEEE, Vol.1,2012 . [13] M. Jianliang , S. Haikun, B. Ling, "The Application on Intrusion Detection Based on K- means Cluster Algorithm" , IFITA '09 Proceedings of the 2009 International Forum on
  • 17. Information , Technology and Applications – Vol.1,pp. 150-152,IEEE ,2009. [14] B. K. Kumar , A. Bhaskar , “Identifying Network Anomalies Using Clustering Technique in Weblog Data”, International Journal of Computers & Technology, Vol. 2 No. 3, June, 2012. [15] S. Akbar , K.Nageswara Rao , J.A.Chandulal ," Intrusion Detection System Methodologies Based on Data Analysis",International Journal of Computer Applications ,Vol. 5 , No.2 , August 2010. [16] K.Bharti, S. Shukla, S. Jain ,"Intrusion detection using clustering", IJCCT, Vol.1 , 2010 [17] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface” , Proceedings of the 4th National Conference; INDIACom, Computing For Nation Development, 2010. [18] The Third International Knowledge Discovery and Data Mining Tools Competition, May 2002,Available from http://kdd.ics.uci.edu/databases/kddcup99.kddcup99.html. [19] M. Sabhnani ,G. Serpen, “Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context “, In Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003), Vol. 1, (2003). [20] F.S.Gharehchopogh, Neda Jabbari, Zeinab Ghaffari Azar ,“Evaluation of Fuzzy K-Means And KMeans Clustering Algorithms In Intrusion Detection Systems” , International Journal of Scientific & Technology Research ,Vol. 1, issue 11, December 2012. [21] M. E. Elhamahmy, H. N. Elmahdy , I. A. Saroit ,"A New Approach for Evaluating Intrusion Detection System" , International Journal of Artificial Intelligent Systems and Machine Learning, Vol. 2, No 11, November 2010 . [22] Dr.S.Siva Sathya, Dr. R.Geetha Ramani and K.Sivaselvi. "Discriminant Analysis based Feature Selection in KDD Intrusion Dataset ", International Journal of Computer Applications 31(11):1-7, October 2011. [23] P. G.Jeya , M. Ravichandran and C. S. Ravichandran ," Efficient Classifier for R2L and U2R Attacks. International Journal of Computer Applications 45(21):29-32, May 2012 . [24] F. N. M. Sabri, N. M.Norwawi, K. Seman," "Identifying False Alarm Rates for Intrusion Detection System with Data Mining", International Journal of Computer Science and Network Security, VOL. 11 No. 4, April 2011 [25] P. Divya , R. Priya," Clustering Based Feature Selection and Outlier Analysis ",International Journal of Computer Science & Communication Networks, Vol 2(6), pg.647- 652. [26] C.Ahlberg, B. Shneiderman ,” Visual information seeking: tight coupling of dynamic query filters with starfield displays” , In proceeding of: Conference on Human Factors in Computing
  • 18. Systems, CHI 1994, Boston, Massachusetts, USA, pp. 313-317,April 24-28, 1994. [27] S. Noel , M. Jacobs , P. Kalapa , S. Jajodia “Multiple Coordinated Views for Network Attack Graphs”, Visualization for Computer Security,.(VizSEC 05). IEEE Workshop on, 99 [28]http://www.researchgate.net/publication/27521564_The_Information_Mural_A_Techniqu e_for_ Displaying_and_Navigating_Large_Information_Spaces [29] http://www.ukessays.com/essays/information-technology/intrusion-detection-system- methodologiesdata-analysis-information-technology-essay.php [30] http://dl.acm.org/citation.cfm?id=1106724 [31] http://www.computer.org/csdl/proceedings/vizsec/2005/2782/00/27820005-abs.html [32] http://dl.acm.org/citation.cfm?id=1106719 [33] Ms. P. K. Karmore and MS. S. T. Bodkhe ,"A Survey on Intrusion in Ad Hoc Networks and its Detection Measures" , International Journal on Computer Science and Engineering (IJCSE) ,3(5),pp.1896-1903,May 2011 . [34] http://bonsai.hgc.jp/~mdehoon/software/cluster/cluster3.pdf - Last visiting at 21.06.2013.
  • 19. On the Migration of a Large Scale Network from IPv4 to IPv6 Environment Muhammad Yeasir Arafat1 , Feroz Ahmed2 and M Abdus Sobhan3 Department of Electrical and Electronic Engineering, School of Engineering and Computer Science, Independent University, Bangladesh ABSTRACT This work mainly addresses the design a large scale network using dual stack mechanisms. We focused on the most important theoretical concepts of the IPv6 protocol, such as addressing, address allocation, routing with the OSPF and BGP protocols and routing protocols performance in dual stack network using GNS3 and Wireshark simulators. we have a tendency to measure a perfect model and a true large-scale network atmosphere victimization out there end-to-end activity techniques that focuses on a large-scale IPv4 and IPv6 backbone and created performance the IPv4 and IPv6 network. In this paper, we compiled IPv6 address planning in large scale network, performance statistics of each network in terms of TCP throughput, delay jitters, packet loss rate, and round trip time. It is found that, a minor degradation within the throughput of the TCP, delay jitter, a lower packet loss rate, and a rather longer round trip time are occurred in a real large scale dual stack network. KEYWORDS IPv6, IPv4, double stack, BGPv4, OSPFv3, ISP, throughput, TCP and RTT For More Details: https://airccse.org/journal/cnc/6214cnc10.pdf Volume Link: https://airccse.org/journal/ijc2014.html
  • 20. REFERENCES [1] Tahir Abdullah, Shahbaz Nazeer, Afzaal Hussain, “NETWORK MIGRATION AND PERFORMANCE ANALYSIS OF IPv4 AND IPv6”, European Scientific Journal, vol. 8, No.5, 2013 [2] Lefty Valle-Rosado, Lizzie Narváez-Díaz, Cinhtia González-Segura and Victor Chi-Pech, “Design and Simulation of an IPv6 Network Using Two Transition Mechanisms”, IJCSI International Journal of Computer Science Issues, Vol.9, No.6, pp: 60-65, Nov. 2012. [3] Internet Engineering Task Force (IETF) RFC 6052, 3513, 4291, 6104, http://tools.ietf.org/html/ [4] Febby Nur Fatah, Adang Suhendra , M Akbar Marwan , Henki Firdaus Henki Firdaus , “Performance Measurements Analysis of Dual Stack IPv4-IPv6”, Proc. of the Second Intl. Conference on Advances in Information Technology — AIT, 2013.. [5] Y. Wang, S. Ye, and X. Li, “Understanding Current IPv6 Performance: A Measurement Study”, 10th IEEE Symposium on Computer Communications, June 2005. [6] Cebrail CIFLIKLI, Ali GEZER and Abdullah Tuncay OZSAHIN, “Packet traffic features of IPv6 and IPv4 protocol traffic, Turk”, J Elec Eng & Comp Science, Vol.20, No5, pp: 727-749, 2012 [7] Alex Hinds, Anthony Atojoko, and Shao Ying Zhu, “Evaluation of OSPF and EIGRP Routing Protocols for IPv6”, International Journal of Future Computer and Communication (IJFCC), Vol.2, No.4, pp: 287-291, Aug. 2013. [8] T. Bates, R. Chandra, D. Katz, and Y. Rekhter, “Multiprotocol Extensions for BGP-4,” Internet Request for Comments, vol. RFC 4760, Jan. 2007. [9] Ing. Luis Marrone, Lic. Andr´es Barbieri and Mg. Mat ‘as Robles, “TCP Performance - CUBIC, Vegas & Reno”, JCS&T, Vol.13, No.1, pp:1-8, April 2013 [10] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated”, volume 1, published by Addisonwisely professional computer series, Pearson Education, 2012
  • 21. PERFORMANCE EVALUATION OF DIFFERENT RASPBERRY PI MODELS AS MQTT SERVERS AND CLIENTS Faiza Al-Salti1 , N. Alzeidi2 , Khaled Day2 , Abderezak Touzene2 , 1 Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2 Sultan Qaboos University, Oman 5G Networks & Beyond, Technical Research Centre of Finland (VTT), Espoo, Finland ABSTRACT This paper studies the impact of different localization schemes on the performance of location-based routing for UWSNs. Particularly, LSWTS and 3DUL localization schemes available in the literature are used to study their effects on the performance of the ERGR-EMHC routing protocol. First, we assess the performance of two localization schemes by measuring their localization coverage, accuracy, control packets overhead, and required localization time. We then study the performance of the ERGR-EMHC protocol using location information provided by the selected localization schemes. The results are compared with the performance of the routing protocol when using exact nodes’ locations. The obtained results show that LSWTS outperforms 3DUL in terms of localization accuracy by 83% and localization overhead by 70%. In addition, the results indicate that the localization error has a significant impact on the performance of the routing protocol. For instance, ERGR-EMHC with LSWTS is better in delivering data packets by an average of 175% compared to 3DUL. KEYWORDS Underwater wireless sensor networks (UWSNs), localization, ranging localization methods, localization error, location-based routing For More Details: https://aircconline.com/ijcnc/V15N2/15223cnc01.pdf Volume Link: https://airccse.org/journal/ijc2023.html
  • 22. REFERENCES [1] Y. Wang, “Three-Dimensional Wireless Sensor Networks: Geometric Approaches for Topology and Routing Design,” in The Art of Wireless Sensor Networks, H. M. Ammari, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 367–409. [2] H. P. Tan, R. Diamant, W. K. G. Seah, and M. Waldmeyer, “A survey of techniques and challenges in underwater localization,” Ocean Engineering, vol. 38, no. 14–15, pp. 1663–1676, October 2011, doi: 10.1016/J.OCEANENG.2011.07.017. [3] F. Al-Salti, N. Alzeidi, and K. Day, “LOCALIZATION SCHEMES FOR UNDERWATER WIRELESS SENSOR NETWORKS: SURVEY,” International journal of Computer Networks & Communications, vol. 12, no. 3, pp. 113–130, May 2019. [4] M. Erol, L. F. M. Vieira, and M. Gerla, “AUV-Aided Localization for Underwater Sensor Networks,” in International Conference on Wireless Algorithms, Systems and Applications (WASA 2007), 1-3 August 2007, pp. 44–54, Chicago, IL, USA. [5] M. Beniwal, R. P. Singh, and A. Sangwan, “A Localization Scheme for Underwater Sensor Networks Without Time Synchronization,” Wireless Personal Communications, vol. 88, no. 3, pp. 537–552, June 2016. [6] M. Isik and O. Akan, “A three dimensional localization algorithm for underwater acoustic sensor networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 9, pp. 4457–4463, September 2009. [7] Z. Zhou, Z. Peng, J.-H. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 3, pp. 335–348, March 2011. [8] Y. Zhou, B. Gu, K. Chen, J. Chen, and H. Guan, “An range-free localization scheme for large scale underwater wireless sensor networks,” Journal of Shanghai Jiaotong University (Science), vol. 14, no. 5, pp. 562–568, October 2009. [9] J. Luo and L. Fan, “A Two-Phase Time Synchronization-Free Localization Algorithm for Underwater Sensor Networks,” Sensors, vol. 17, no. 12, p. 726, March 2017. [10] K. Day, F. Al-Salti, A. Touzene, and N. Alzeidi, “AN EFFICIENT DATA COLLECTION PROTOCOL FOR UNDERWATER WIRELESS SENSOR NETWORKS,” International Journal of Computer Networks & Communications (IJCNC), vol. 12, no. 5, pp. 1–15, September 2020, doi: 10.5121/ijcnc.2020.12501. [11] P. Xie, J.-H. Cui, and L. Lao, VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks, in Proceedings of IFIP Networking'06, Coimbra, Portugal, 2006, pp. 1216–1221. [12] F. Al Salti, N. Alzeidi, and B. Arafeh, EMGGR: An Energy-Efficient Multipath Grid-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks, Wireless Networks, volume 23, no. 4, pp. 1301–1314, May 2017. International Journal of Computer Networks & Communications (IJCNC) Vol.15, No.2, March 2023 18 [13] N. Javaid, M. Shah, A. Ahmad, M. Imran, M. Khan, and A. Vasilakos, “An Enhanced Energy Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks,” Sensors, vol. 16,
  • 23. no. 4, p. 487, April 2016, doi: 10.3390/s16040487. [14] F. Al-Salti, N. Alzeidi, K. Day, and A. Touzene, “An efficient and reliable grid-based routing protocol for UWSNs by exploiting minimum hop count,” Computer Networks, vol. 162, p. 106869, October 2019. [15] B. Peng and A. H. Kemp, “Energy-efficient geographic routing in the presence of localization errors,” Computer Networks, vol. 55, no. 3, pp. 856–872, February 2011. [16] M. Kadi and I. Alkhayat, “The effect of location errors on location based routing protocols in wireless sensor networks,” Egyptian Informatics Journal, vol. 16, no. 1, pp. 113–119, March 2015. [17] R. C. Shah, A. Wolisz, and J. M. Rabaey, “On the performance of geographical routing in the presence of localization errors,” in IEEE International Conference on Communications, 2005. ICC 2005, 16-20 May 2005, vol. 5, pp. 2979–2985, Seoul, South Korea. [18] D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on geographic routing in mobile ad hoc sensor networks: analysis and improvement using mobility prediction,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 233–245, July 2004. [19] Erol, L. F. M. Vieira, and M. Gerla, “Localization with Dive’N’Rise (DNR) beacons for underwater acoustic sensor networks,” in Proceedings of the second workshop on Underwater networks - WuWNet ’07, 14 September 2007, pp. 97-100, Montreal, Quebec, Canada. [20] V. Chandrasekhar and W. Seah, “An Area Localization Scheme for Underwater Sensor Networks,” in OCEANS 2006 - Asia Pacific, 16-19 May 2006, pp. 1–8, Singapore, Singapore. [21] A. M. Abu-Mahfouz and G. P. Hancke, “ns-2 extension to simulate localization system in wireless sensor networks,” in IEEE Africon ’11, 13-15 September 2011, pp. 1–7, Livingstone, Zambia. [22] M. Erol-Kantarci, S. Oktug, L. Vieira, and M. Gerla, “Performance evaluation of distributed localization techniques for mobile underwater acoustic sensor networks,” Ad Hoc Networks, vol. 9, no. 1, pp. 61–72, January 2011. [23] Z. Zhou, J.-H. Cui, and S. Zhou, “Efficient localization for large-scale underwater sensor networks,” Ad Hoc Networks, vol. 8, no. 3, pp. 267–279, May 2010. [24] Z. Qiang, Z. Senlin, and L. Meiqin, “A clock synchronization independent localization scheme for underwater wireless sensor networks,” in Proceedings of the Eighth ACM International Conference on Underwater Networks and Systems - WUWNet ’13, 11-13 November 2013, pp. 1–5, Kaohsiung, Taiwan. [25] F. Al-Salti, N. Alzeidi, K. Day and A. Touzene, “Multiple Sink Placement Strategy for Underwater Wireless Sensor Networks,” Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), 19-21 June 2018, Rome, Italy. [26] F. Al-Salti, A. N, K. Day, B. Arafeh, and A. Touzene, “Grid Based Priority Routing Protocol for UWSNs,” International journal of Computer Networks & Communications, vol. 9, no. 6, pp. 01–20, December 2017, doi: 10.5121/ijcnc.2017.9601.
  • 24. INTRUSION PREVENTION/INTRUSION DETECTION SYSTEM (IPS/IDS) FOR WIFI NETWORKS Michal Korcak, Jaroslav Lamer and Frantisek Jakab, Technical University of Košice, Slovakia ABSTRACT The nature of wireless networks itself created new vulnerabilities that in the classical wired networks do not exist. This results in an evolutional requirement to implement new sophisticated security mechanism in form of Intrusion Detection and Prevention Systems. This paper deals with security issues of small office and home office wireless networks. The goal of our work is to design and evaluate wireless IDPS with use of packet injection method. Decrease of attacker’s traffic by 95% was observed when compared to attacker’s traffic without deployment of proposed IDPS system. KEYWORDS Deauthentification, Intrusion detection, Intrusion prevention, Packet injection, WiFi For More Details: https://airccse.org/journal/cnc/6414cnc07.pdf Volume Link: https://airccse.org/journal/ijc2014.html
  • 25. REFERENCES [1] Henry, Paul & Luo, Hui, (2002) “WiFi: what's next?”. Communications Magazine, IEEE, 40.12: 66- 72. [2] Tews, Erik & Beck, Martin, (2009) “Practical attacks against WEP and WPA” In: Proceedings of the second ACM conference on Wireless network security. ACM, p. 79-86. [3] Gounaris, Georgios, (2014) “WiFi security and testbed implementation for WEP/WPA cracking demonstration”. [4] L. T. Heberlein & K. N. Levitt & B. Mukherjee, (1991) “A Method To Detect Intrusive Activity in a Networked Environment”. In: 14th National Computer Security Conference. Washington, D.C.: National Institute of Standards and Technology, National Computer Security Center, pp. 362-371 [5] Karen, Scarfone & Peter Mell, (2007) “Guide To Intrusion Detection And Prevention Systems (IDPS)”. Washington, D.C.: National Institute of Standards and Technology, Special Publication 800- 94, 128 p. [6] Michael Rash, (2007) “Linux Firewalls - Attack Detection And Response With Iptables”, Psad And Fwsnort. San Francisco: No Starch Press, 388 p. [7] Allen, Lee (2012) “Advanced Penetration Testing for Highly--Secured Environments: The Ultimate Security Guide”. Birmingham: Packt Publishing Ltd., 414p. [8] “Linux Wireless - Hostapd Linux Documentation Page”. [online]. [cit. 14. April. 2014]. Available online: . [9] KAZIENKO, Przemyslaw; DOROSZ, Piotr. Intrusion detection systems (IDS) Part 2- Classification; methods; techniques. WindowsSecurity. com, 2004. [10] CARL, Glenn, et al. Denial-of-service attack-detection techniques. Internet Computing, IEEE, 2006, 10.1: 82-89