Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

Optimizing Concentric Circular Antenna Arrays for High-Altitude Platforms Wireless Sensor Networks

Optimizing Concentric Circular Antenna Arrays for High-Altitude Platforms Wireless Sensor Networks

Yasser Albagory, Omar Said

Статья научная

Wireless Sensor Networks (WSN) has gained interest in many applications and it becomes important to improve its performance. Antennas and communication performance are most important issues of WSN. In this paper, an adaptive concentric circular array (CCA) is proposed to improve the link between the sink and sensor nodes. This technique is applied to the new High – Altitude Platform (HAP) Wireless Sensor Network (WSN). The proposed array technique is applied for two coverage scenarios; a wider coverage cell of 30 km radius and a smaller cell of 8 km radius. The feasibility of the link is discussed where it shows the possibility of communications between the HAP sink station and sensor nodes located on the ground. The proposed CCA array is optimized using a modified Dolph-Chebyshev feeding function. A comparison with conventional antenna models in literature shows that the link performance in terms of bit energy to noise power spectral density ratio can be improved by up to 11.37 dB for cells of 8 km radius and 16.8 dB in the case of 30 km radius cells that make the link at 2.4 GHz feasible and realizable compared to using conventional antenna techniques.

Бесплатно

Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm

Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm

Dac-Nhuong Le

Статья научная

In this paper, we focus on the network topological design for providing Quality of Service (QoS) in Next Generation Network (NGN) and propose an effective Ant Colony Optimization (ACO) algorithm to solve the capacitated minimum spanning tree (cMTS) problem in dynamic environment. To improve QoS of communication network with considering the network provisioning capability and dynamic environment, we formulate this problem with minimizing the communication cost (as a kind of performance measures for network's QoS). Our objective functions are determined by pheromone matrix of ants satisfies capacity constraints to find good approximate solutions of cMST problems. Numerical experiments show that our algorithm have achieved much better than recent researches.

Бесплатно

Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime

Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime

Biswaranjan Sarangi, Biswajit Tripathy

Статья научная

In wireless sensor networks (WSN), sensor nodes are expected to operate autonomously in a human inaccessible and the hostile environment for which the sensor nodes and communication links are therefore, prone to faults and potential malicious attacks. Sensor readings that differ significantly from the usual pattern of sensed data due to faults in sensor nodes, unreliable communication links, and physical and logical malicious attacks are considered as outliers. This paper presents an outlier detection technique based on deep learning namely, generative adversarial networks (GANs) with autoencoder neural network. The two-level architecture proposed for WSN makes the proposed technique robust. The simulation result indicates improvement in detection accuracy compared to existing state-of-the-art techniques applied for WSNs and increase of the network lifetime. Robustness of outlier detection algorithm with respect to channel fault and robustness concerning different types of distribution of faulty communication channel is analyzed.

Бесплатно

Overview and Comparison of Candidate 5G Waveforms: FBMC, UFMC and F-OFDM

Overview and Comparison of Candidate 5G Waveforms: FBMC, UFMC and F-OFDM

Ali J. Ramadhan

Статья научная

The fifth generation (5G) technology standard, utilizing the Internet of Things, promises enhanced communication systems. However, the efficiency expected from such systems entails significant requirements, such as higher data rates and flexibility of the lowest 5G layer. Meeting these requirements in subsequent wireless communication systems is highly dependent on the use of waveforms capable of efficiently enabling multiple access. In other words, proper waveforms determine the effective handling of diverse traffic within a given band. In this study, four candidate multicarrier waveforms, namely filtered orthogonal frequency division multiplexing, filter bank multicarrier, universal filtered multicarrier, and orthogonal frequency division multiplexing, which is currently used in 4G systems, are compared based on multiple parameters. MATLAB simulation results indicate that the waveforms significantly improved spectrum localization and provided appropriate spectrum fragmentation. As these waveforms can mix diverse traffic specifications, they handle the problem of time-frequency synchronization effectively. Therefore, these new waveforms exhibit significant potential in terms of orthogonality and synchronicity and can support numerous users without dropping signals. In addition, they support all applications and scenarios related to multiple-input and multiple-output. The obtained simulation results confirm the suitability of such waveforms for 5G applications and systems.

Бесплатно

PAPR reduction in OFDM system using clipping and filtering methods based on CCDF

PAPR reduction in OFDM system using clipping and filtering methods based on CCDF

Tanvir Ul Haque, Sharif Hossen

Статья научная

Wireless communication systems are becoming so promising day-by-day due to the mobility and the dynamicity of communication pattern. But, to fulfill the wide range of user’s demand it has become much important to use some techniques which would be most efficient in terms of bandwidth and speed. The multicarrier strategy, called as orthogonal frequency division multiplexing (OFDM) has outstanding features to fulfill these demands. Multipath fading, delay spread, frequency selective fading and inter channel interference all of these limitations of wireless communication compound it with the scarcity of bandwidth gave rise to OFDM. However, the high peak-to-average power ratio is a great problem or a barrier in OFDM which causes the signal being distorted with the insufficient power at the receiver. There are some specified techniques to minimize it. In this paper, we have used clipping and filtering methods to minimize the effect of peak-to-average power ratio.

Бесплатно

PEECA: PSO-Based Energy Efficient Clustering Algorithm for Wireless Sensor Networks

PEECA: PSO-Based Energy Efficient Clustering Algorithm for Wireless Sensor Networks

Santar Pal Singh, Subhash Chander Sharma

Статья научная

In previous years, wireless sensor networks (WSNs) have fascinated lot of consideration from the scientific and technical society. The distributed characteristics and dynamic topology of sensor networks initiates very peculiar necessities in routing schemes that supposed to be met. The key feature of efficient routing protocol is energy expenditure and extension in lifetime of network. In past few years, various routing algorithms have been presented for WSNs. In this work, we focus on cluster based routing algorithms and propose a new algorithm for routing in WSNs. We perform the analysis of our new cluster based algorithms with existing algorithm on the basis of performance metrics. Simulation results shows that proposed algorithm outperform the other existing algorithms of his category.

Бесплатно

PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes

PNFEA: A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes

Mohammad Rasmi, Ahmad Al-Qerem

Статья научная

Nowadays, cyber crimes are increasing and have affected large organizations with highly sensitive information. Consequently, the affected organizations spent more resources analyzing the cyber crimes rather than detecting and preventing these crimes. Network forensics plays an important role in investigating cyber crimes; it helps organizations resolve cyber crimes as soon as possible without incurring a significant loss. This paper proposes a new approach to analyze cyber crime evidence. The proposed approach aims to use cyber crime evidence to reconstruct useful attack evidence. Moreover, it helps investigators to resolve cyber crime efficiently. The results of the comparison of the proposed approach prove that it is more efficient in terms of time and cost compared with the generic and the modern process approach for network forensics.

Бесплатно

PSO and TLBO based reliable placement of controllers in SDN

PSO and TLBO based reliable placement of controllers in SDN

Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava

Статья научная

SDN (software defined networks) is a programmable network architecture that divides the forwarding plane and control plane. It can centrally manage the network through a software program, i.e., controller. Multiple controllers are required to manage the current software defined WAN. Placing multiple controllers in a network is known as controller placement problem (CPP). Only one controller is not capable to handle the scalability and reliability issues. To tackle these issues, multiple controllers are required. Efficient deployment of controllers in SDN is used to improve the performance and reliability of the network. To the best of our knowledge, this is the first attempt to minimize the total average latency of reliable SDN along with the implementation of TLBO and PSO algorithms to solve CPP. Our experimental results show that TLBO outperforms PSO for publicly available topologies.

Бесплатно

Parallel prefix sum algorithm on optoelectronic biswapped network hyper hexa-cell

Parallel prefix sum algorithm on optoelectronic biswapped network hyper hexa-cell

Ashish Gupta, Bikash Kanti Sarkar

Статья научная

The biswapped network hyper hexa-cell is recently reported optoelectronic network architecture for delivering excellent performance especially for mapping numerical problems which demands frequent routing and broadcasting. This network contains some important benefits such as smaller diameter, higher bisection width, and lower network’s total and optical cost as compared to counter-part OTIS hyper hexa-cell network. It is also advantageous as compared to the traditional biswapped network mesh containing smaller diameter and higher minimum node degree. In this paper, we present a parallel algorithm for mapping prefix sum of 2×(6×2^(d_h-1) )^2 data elements on a dh-dimensional biswapped network hyper hexa-cell of2〖×(6×2^(d_h-1) )〗^2 processors (assuming each processor contain single data element). It demands total ((d_h- 1)×(d_h+ 1))- ((d_h- 1)×(d_h- 2))/2+ 5d_h + 10 intra-cluster (electronic) and 3 inter-cluster (optical) moves.

Бесплатно

Parameter Estimation of Cellular Communication Systems Models in Computational MATLAB Environment: A Systematic Solver-based Numerical Optimization Approaches

Parameter Estimation of Cellular Communication Systems Models in Computational MATLAB Environment: A Systematic Solver-based Numerical Optimization Approaches

Joseph Isabona, Sayo A. Akinwumi, Theophilus E. Arijaje, Odesanya Ituabhor, Agbotiname Lucky Imoize

Статья научная

Model-based parameter estimation, identification, and optimisation play a dominant role in many aspects of physical and operational processes in applied sciences, engineering, and other related disciplines. The intricate task involves engaging and fitting the most appropriate parametric model with nonlinear or linear features to experimental field datasets priori to selecting the best optimisation algorithm with the best configuration. Thus, the task is usually geared towards solving a clear optimsation problem. In this paper, a systematic-stepwise approach has been employed to review and benchmark six numerical-based optimization algorithms in MATLAB computational Environment. The algorithms include the Gradient Descent (GRA), Levenberg-Marguardt (LEM), Quasi-Newton (QAN), Gauss-Newton (GUN), Nelda-Meald (NEM), and Trust-Region-Dogleg (TRD). This has been accomplished by engaging them to solve an intricate radio frequency propagation modelling and parametric estimation in connection with practical spatial signal data. The spatial signal data were obtained via real-time field drive test conducted around six eNodeBs transmitters, with case studies taken from different terrains where 4G LTE transmitters are operational. Accordingly, three criteria in connection with rate of convergence Results show that the approximate hessian-based QAN algorithm, followed by the LEM algorithm yielded the best results in optimizing and estimating the RF propagation models parameters. The resultant approach and output of this paper will be of countless assets in assisting the end-users to select the most preferable optimization algorithm to handle their respective intricate problems.

Бесплатно

Parameter training in MANET using artificial neural network

Parameter training in MANET using artificial neural network

Baisakhi Chatterjee, Himadri Nath Saha

Статья научная

The study of convenient methods of information dissemination has been a vital research area for years. Mobile ad hoc networks (MANET) have revolutionized our society due to their self-configuring, infrastructure-less decentralized modes of communication and thus researchers have focused on finding better and better ways to fully utilize the potential of MANETs. The recent advent of modern machine learning techniques has made it possible to apply artificial intelligence to develop better protocols for this purpose. In this paper, we expand our previous work which developed a clustering algorithm that used weight-based parameters to select cluster heads and use Artificial Neural Network to train a model to accurately predict the scale of the weights required for different network topologies.

Бесплатно

Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks

Particle Swarm Optimization for Multi-constrained Routing in Telecommunication Networks

Hongyan Cui, Jian Li, Xiang Liu, Yunlong Cai

Статья научная

By our analysis, the QoS routing is the optimization problem under the satisfaction of multiple QoS constraints. The Particles Swarm Optimization (PSO) is an optimization algorithm which has been applied to finding shortest path in the network. However, it might fall into local optimal solution, and is not able to solve the routing based on multiple constraints. To tackle this problem, we propose a new method of solving the multiple constraints routing. This paper firstly sets up a multi constrained QoS routing model and constructs the fitness value function by transforming the QoS constraints with a penalty function. Secondly, the iterative formulas of the original PSO are improved to tailor to non-continuous search space of the routing problem. Finally, the natural selection and mutation ideas of the Genetic Algorithm (GA) are applied to the PSO to improve the convergent performance. The simulation results show that the proposed GA-PSO algorithm can not only successfully solve the multi-constrained QoS routing problem, but also achieves a better effect in the success rate of the searching optimal path.

Бесплатно

Passive Antenna Arrays in UAV Communication Systems

Passive Antenna Arrays in UAV Communication Systems

Olga Shcherbyna, Oleksandr Zadorozhnyi, Olexii Stetsyshin

Статья научная

This article explores the design, modeling, and experimental validation of passive antenna arrays (AAs) tailored for unmanned aerial vehicle (UAV) communication systems. Focusing on the technical composition and functionalities of various types of passive antenna arrays, the study delves into different antenna elements that comprise these arrays, discussing their integration into comprehensive systems. Through rigorous modeling aimed at predicting performance in diverse operational conditions and backed by experimental studies, the paper provides practical insights for the development and optimization of AAs. These passive systems leverage the collective strength of multiple antennas to form directed beams, enhancing signal clarity and reducing interference, thereby supporting robust communication links essential for UAV operations.

Бесплатно

Password Hardened Biometric: A Complete Solution of Online Security

Password Hardened Biometric: A Complete Solution of Online Security

Ajay Sharma, Deo Brat Ojha

Статья научная

In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security of online transaction using secure and unique biometric template. The uniqueness of our process is that we store biometric template and password together in encrypted form both without the fusion of score level and decision level, which leads a successful way to combine multiple technologies, different from earlier methods. Password hardened biometric system helps to generate many different secure biometric templates for the same biometric system. It also generates unique biometric templates for multiple biometric systems from the same biometric trait.

Бесплатно

Password Security: An Analysis of Password Strengths and Vulnerabilities

Password Security: An Analysis of Password Strengths and Vulnerabilities

Katha Chanda

Статья научная

Passwords can be used to gain access to specific data, an account, a computer system or a protected space. A single user may have multiple accounts that are protected by passwords. Research shows that users tend to keep same or similar passwords for different accounts with little differences. Once a single password becomes known, a number of accounts can be compromised. This paper deals with password security, a close look at what goes into making a password strong and the difficulty involved in breaking a password. The following sections discuss related work and prove graphically and mathematically the different aspects of password securities, overlooked vulnerabilities and the importance of passwords that are widely ignored. This work describes tests that were carried out to evaluate the resistance of passwords of varying strength against brute force attacks. It also discusses overlooked parameters such as entropy and how it ties in to password strength. This work also discusses the password composition enforcement of different popular websites and then presents a system designed to provide an adaptive and effective measure of password strength. This paper contributes toward minimizing the risk posed by those seeking to expose sensitive digital data. It provides solutions for making password breaking more difficult as well as convinces users to choose and set hard-to-break passwords.

Бесплатно

Patch Based Sclera and Periocular Biometrics Using Deep Learning

Patch Based Sclera and Periocular Biometrics Using Deep Learning

V. Sandhya, Nagaratna P. Hegde

Статья научная

Biometric authentication has become an essential security aspect in today's digitized world. As limitations of the Unimodal biometric system increased, the need for multimodal biometric has become more popular. More research has been done on multimodal biometric systems for the past decade. sclera and periocular biometrics have gained more attention. The segmentation of sclera is a complex task as there is a chance of losing some of the features of sclera vessel patterns. In this paper we proposed a patch-based sclera and periocular segmentation. Experiments was conducted on sclera patches, periocular patches and sclera-periocular patches. These sclera and periocular patches are trained using deep learning neural networks. The deep learning network CNN is applied individually for sclera and periocular patches, on a combination of three Data set. The data set has images with occlusions and spectacles. The accuracy of the proposed sclera-periocular patches is 97.3%. The performance of the proposed patch-based system is better than the traditional segmentation methods.

Бесплатно

Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN

Path Loss Analysis of ZigBee for Smart Meter Network Deployment in NAN

Sehan Samarakoon, Maheshi B Dissanayake, Kithsiri M Liyanage, Sudheera Navaratne, Chirantha Jayasinghe, Prabhath Illangakoon

Статья научная

A fundamental and vital aspect of Smart Metering infrastructure is the communication technologies and techniques associated with it, especially between the Smart Meters and the Data Concentrator Unit. Among many available communication technologies, ZigBee provides a low-cost, low-power, and easy-to-deploy network solution for a Smart Meter network. There exists limited literature that discusses ZigBee as a potential communication technology for long-range networks. Hence thorough analysis is demanded on the suitability of ZigBee for smart meter deployment under different types of environmental conditions, coverage ranges, and obstacles. This work evaluates the performance of an extended ZigBee module in outdoor as well as indoor conditions in the presence of different types of obstacles. Parameters are obtained for path loss exponent and the standard deviation of the Gaussian Random variable to validate the Log Normal Shadowing model for modeling long-range ZigBee communication. The impact of obstacles on path loss is also considered. The results show that the Log Normal Shadowing model is a good approximation for the behavior of ZigBee path loss. Accordingly, the suitability of ZigBee for a Smart Meter network spanned as a Neighborhood Area Network is also assessed based on the approximated model.

Бесплатно

Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks

Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks

Goudru N.G, Vijaya Kumar B.P

Статья научная

In wireless networks two types of losses namely congestion loss and transmission loss are significant. One of the important transmission losses is jitter. Variation in inter-arrival time is called jitter. When jitter value is greater than half of the average round trip time cause timeout loss and sender window size falls to one packet resulting reduction in throughput and degradation in the quality of service (QoS). In this paper, we are discussing a new model for transmission control protocol (TCP) which is capable of changing its window size based on the feedback. In the new model TCP is added with intelligence so that it can distinguish the type of losses. If the loss is due to congestion, congestion control algorithm is invoked and loss is due to jitter immediate-recovery algorithm is invoked to recover from the throughput loss. The technique also provides an end-to-end congestion control. The performance of TCP is further enhanced by discussing stability. Time-delay control theory is applied for the analysis of asymptotic stability. The stability boundaries of random early detection (RED) control parameter Pmax and jitter control parameter β are derived. Using the characteristic equation of Hermite matrix an approximate solution of q(t) (queue length) which converges to a given target value is derived. The results are analyzed based on graphs and statistical data using Matlab R2009b.

Бесплатно

Performance Analysis of 5G New Radio LDPC over Different Multipath Fading Channel Models

Performance Analysis of 5G New Radio LDPC over Different Multipath Fading Channel Models

Mohammed Hussein Ali, Ghanim A. Al-Rubaye

Статья научная

The creation and developing of a wireless network communication that is fast, secure, dependable, and cost-effective enough to suit the needs of the modern world is a difficult undertaking. Channel coding schemes must be chosen carefully to ensure timely and error-free data transfer in a noisy and fading channel. To ensure that the data received matches the data transmitted, channel coding is an essential part of the communication system's architecture. NR LDPC (New Radio Low Density Parity Check) code has been recommended for the fifth-generation (5G) to achieve the need for more internet traffic capacity in mobile communications and to provide both high coding gain and low energy consumption. This research presents NR-LDPC for data transmission over two different multipath fading channel models, such as Nakagami-m and Rayleigh in AWGN. The BER performance of the NR-LDPC code using two kinds of rate-compatible base graphs has been examined for the QAM-OFDM (Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing) system and compared to the uncoded QAM-OFDM system. The BER performance obtained via Monte Carlo simulation demonstrates that the LDPC works efficiently with two different kinds of channel models: those that do not fade and those that fade and achieves significant BER improvements with high coding gain. It makes sense to use LDPC codes in 5G because they are more efficient for long data transmissions, and the key to a good code is an effective decoding algorithm. The results demonstrated a coding gain improvement of up to 15 dB at 10-3 BER.

Бесплатно

Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation

Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation

Awadhesh Kumar, Prabhat Singh, Vinay Kumar, Neeraj Tyagi

Статья научная

A Mobile Ad-hoc Network (MANET) is a collection of multi-hop wireless mobile nodes among which the communication is carried out without any centralized control or fixed infrastructure. MANET is a self-organized, self-configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The wireless link in the network are highly error prone and can go down frequently due to the mobility of nodes, interference and less infrastructure. Hence, because of the highly dynamic environment routing in MANET is a very difficult task. Over the last decade various routing protocols have been proposed for the mobile ad-hoc network and the most important among all of them are AODV, DSR, DSDV and CBRP. This research paper gives the overview of these routing protocols as well as the characteristics and functionality of these routing protocols along with their pros and cons and then make their comparative analysis in order to measure the performance of the network. The main objective of this paper is to compare the performance of all the four routing protocols and then to make the observations about how the performance of these routing protocols can be improved. Performance of these routing protocols are compared on the basis of various parameters such as throughput, delay and packet delivery ratio.

Бесплатно

Журнал