International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1166
Статья научная
This paper presents the performance evaluation of 3G mobile networks for one kind of multimedia application called Voice over IP (VoIP) within Bangkok, the capital city of Thailand, using Line and Skype, two popular VoIP applications. This study used evaluation of voice quality provided by both applications. The tests have been conducted using stationary scenarios over 5 major 3G mobile networks, served by 5 operators, within 14 universities in the inner city of Bangkok in order to gather data of degraded speech files. Then, the data was measured using Perceptual Evaluation of Speech Quality (PESQ) to find Mean Opinion Score (MOS) before analyzing with ANOVA and T-test, which are statistical tools, so that the discussion and conclusion can be eventually derived.
Бесплатно
Статья научная
Multi-access Edge Computing optimizes computation in proximity to smart mobile devices, addressing the limitations of devices with insufficient capabilities. In scenarios featuring multiple compute-intensive and delay-sensitive applications, computation offloading becomes essential. The objective of this research is to enhance user experience, minimize service time, and balance workloads while optimizing computation offloading and resource utilization. In this study, we introduce dynamic computation offloading algorithms that concurrently minimize service time and maximize the quality of experience. These algorithms take into account task and resource characteristics to determine the optimal execution location based on evaluated metrics. To assess the positive impact of the proposed algorithms, we employed the Edgecloudsim simulator, offering a realistic assessment of a Multi-access Edge Computing system. Simulation results showcase the superiority of our dynamic computation offloading algorithm compared to alternatives, achieving enhanced quality of experience and minimal service time. The findings underscore the effectiveness of the proposed algorithm and its potential to enhance mobile application performance. The comprehensive evaluation provides insights into the robustness and practical applicability of the proposed approach, positioning it as a valuable solution in the context of MEC networks. This research contributes to the ongoing efforts in advancing computation offloading strategies for improved performance in edge computing environments.
Бесплатно
RSUs Deployment Using Parallel Scheduling
Статья научная
Advancement in software, hardware and communication technologies have led to the development of design and implementation of different types of networks that are deployed in various environments. One such network that has gained a lot of interest in the last few decades is the Vehicular Ad-Hoc Network (VANET). VANET has become an active area of research, development and standardization because it has remarkable potential to improve vehicle and road safety, traffic management, and also provide comfort to both drivers and passengers. Roadside units (RSUs) are a vital component of Vehicular ad hoc network (VANET). Mainly, the density and location of RSUs decides the success of a VANET. But, the sky-high deployment costs of the RSUs make it impossible to deploy a large number of RSUs on the specific area or road. Thus, there rises a need to optimally deploy a restricted number of RSUs in a given region in order to achieve maximum performance. This paper presents a new TDB based RSUs deployment algorithm with a goal of attaining high efficiency and cover maximum area. Matlab platform is used to assess the performance of the proposed algorithm using several performance metrics.
Бесплатно
Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations
Статья научная
Today's Grids include resources (referred as Grid-site s) from different domains including dedicated production resources, resources from university labs, and even P2P en¬vironments. Grid high level services, like schedulers, resource managers, etc. need to know the reliability of the available Grid-sites to select the most suitable from them. Modeling reliability of a Grid-site for successful execution of a job requires prediction of Grid-site availability for the given duration of job execution as well as possibility of successful execution of the job. Predicting Grid-site availability is complex due to different availability patterns, resource sharing policies implemented by resource owners, nature of domain the resource belongs to (e.g. P2P etc.), and its maintenance etc. To give a solution, we model reliability of Grid-site in terms of prediction of its availability and possibility of job success. Our availability predictions incorporate past patterns of the Grid-site availability using pattern recognition methods. To estimate possibility of job success, we consider historical traces of job execution. The experiments conducted on a trace of real Grid demonstrate the effectiveness of our approach for ranking Grid-sites based on their reliability for executing jobs successfully.
Бесплатно
Real time universal scalable wireless sensor network for environmental monitoring application
Статья научная
There are several wireless sensor network use for environmental monitoring applications. However, most wireless sensor network designed for real time environmental monitoring application are application specific and static in nature. Hence, the need for reprogramming of base station for every change in sensor type or the introduction of new sensor node into the network. More so, since these sensors nodes are deploy by end users in a random region of interest, it is necessary to develop a new plug and play mechanisms with more software modules and more user-friendly interface that is scalable to ease larger area deployment, installation and maintenance. Hence, this paper developed a base station with an auto detection and configuration system for detecting new sensor node, faulty nodes, and update user in real time. The developed system is implemented on a mesh topology network and was calibrated using standard Davis vantage pro2 weather station in Ahmadu Bello University Liquefied Natural Gas Environmental Laboratory and a mean error of 0.12 and root mean square error of 0.14 were obtained.
Бесплатно
Real-Time Encryption/Decryption of Audio Signal
Статья научная
Encryption is a way to secure and verify data that are traded through public communication channels in the presence of intruder party called antagonists. Consequently, the transmitted or stored message can be converted to unreadable form except for intended receivers. The decryption techniques allows intended receiver to reveal the contents of previously encrypted message via secrete keys exchanged exclusively between transmitter and receiver. The encryption and decryption techniques can be applied equally to a message in any form such as text, image, audio or video. The current paper applies and evaluate two different encryption/decryption algorithms to the real-time audio signal. The first one is the well-known RSA encryption and decryption technique, while the second one is a new suggested algorithm based on symmetric cryptography concept. The Matlab Simulink simulator tool is used for acquiring the real-time audio signal and simulating the proposed algorithms. Considering the mathematical nature of the audio signal, the experimental results showed that the RSA method yields an audio signal with low quality while the suggested algorithm yields audio signal with high quality as exact signal as the original one.
Бесплатно
Real-time Sybil Attack Detection Based on Channel Characterization in VANET
Статья научная
Vehicular Ad hoc Networks (VANETs) are vital for efficient and secure vehicle-to-infrastructure communication in intelligent transportation systems. sybil attacks, where malicious entities adopt multiple identities, are a major security concern in VANETs. Detecting and mitigating these attacks is crucial for ensuring communication reliability and trust. This article focuses on detecting sybil attacks in Vehicle-to-Vehicle (V2V) communication by using a novel mechanism that characterizes the wireless channel through Received Signal Strength Indicator (RSSI) and angular spread in both azimuth and elevation planes. By incorporating angular spread alongside RSSI, the proposed mechanism offers more accurate and robust detection, particularly in dense vehicle environments. Utilizing a precise wireless channel model based on ray tracing statistics, the approach outperforms traditional RSSI-based methods. Experimental results confirm the enhanced accuracy and reliability of the proposed mechanism for detecting sybil attacks in V2V communication scenarios.
Бесплатно
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
Статья научная
The communication between processing elements is suffering challenges due to power, area and latency. Temporary flit storage during communication consumes the maximum power of the whole power consumption of the chip. The majority of current NoCs consume a high amount of power and area for router buffers only. Removing buffers and virtual channels (VCs) significantly simplifies router design and reduces the power dissipation by a considerable amount. The buffering scheme used in virtual channeling in a network-on-chip based router plays a significant role in determining the performance of the whole network-on-chip based mesh. Elastic buffer (EB) flow control is a simple control logic in the channels to use pipeline flip-flops (FFs) as storage locations. With the use of elastic buffers, input buffers are no longer required hence leading to a simplified router design. In this paper properties of buffers are studied with a test microarchitecture router for several packet injection rates given at an input port. The prime contribution of this article is the evaluation of various forms of the elastic buffers for throughput, FPGA resource utilization, average power consumed, and the maximum speed offered. The article also gives a comparison with some available buffering policies against throughput. The paper presents the synthesis and implementation on FPGA platforms. The work will help NoC designers in suitable simple router implementation for their FPGA design. The implementation targets Virtex5 FPGA and Stratix III device family.
Бесплатно
Статья научная
Recently, many research works have been focused on the fiber optic devices for optical communication systems. One of the main interests is on the optical amplifiers to boost a weak signal in the communication systems. In order to overcome the limitations imposed by electrical regeneration, a means of optical amplification was sought. The competing technology emerged: the first was Raman amplification. One reason was that the optical pump powers required for Raman amplification were significantly higher than that for Erbium doped fiber amplifier (EDFA), and the pump laser technology could not reliably deliver the required powers. However, with the improvement of pump laser technology Raman amplification is now an important means of expanding span transmission reach and capacity. We have deeply studied an analytical model for optical distributed Raman amplifiers (DRAs) in the transmission signal power and pump power within Raman amplification technique in co-pumped, counter-pumped, and bi-directional pumping direction configurations through different types of fiber cable media. The validity of this model was confirmed by using experimental data and numerical simulations.
Бесплатно
Recent Replica Placement Algorithms in P2P Networks – A Review
Статья научная
Peer-to-Peer (P2P) systems provide a platform for large internet scale distributed applications with no dedicated infrastructure. In P2P systems, applications are developed by dividing them across individual systems termed peers which take the role of both client as well as server. Popularity of objects in such a system can change rapidly, which demands the need for a rapid and light weight content replication strategy which considers this dynamic popularity changes. While considering P2P in distributed file sharing applications, data availability has significant impact on the system's performance. In addition to optimized availability, the replica placement should guarantee reduced search and data access latency. It should be dynamically adaptable to instantaneous query arrival rate as well as dynamic membership of individual peers. Also, it should provide good performance with reduced number of control messages. Thus an intelligent placement of replicas considering various factors of the system always outperforms a random placement of replicas on random peers. This paper reviews and compares various recent replica placement algorithms for structured as well as unstructured P2P networks.
Бесплатно
Reciprocity based Energy Efficient Cooperative Routing Protocol for WSNs
Статья научная
Prolonging network lifetime by salvaging the energy of low battery capacity nodes is a prime concern in Wireless Sensor Networks. Energy efficient routing protocols try to improve the node lifetime by restricting their participation in the routing process. This leads to selfish node behavior causing disruption of inherent network cooperation. This paper proposes an elegant routing mechanism based on direct reciprocity principle, named energy efficient cooperative ad hoc on-demand distance vector (EECoAODV). Proposed protocol correctly differentiates between inherently selfish nodes that use the energy of other nodes to relay their packets, but refuse to reciprocate; and the energy critical nodes that have turned non-cooperative for their own survival. Selfish nodes are punished and eliminated from the routing process thus prolonging the battery capacity of energy critical nodes to improve the overall network performance. EECoAODV is implemented in Qualnet simulator and its performance is compared with conventional AODV and reinforcement based state-action-reward-action (SARSA) routing mechanism. Results show that EECoAODV improves the lifetime of energy critical nodes and thus delivers improved packet delivery ratio than SARSA-AODV and conventional AODV.
Бесплатно
Статья научная
The project envisages the creation of a complex system that integrates advanced technologies of machine learning and natural language processing for media content analysis. The main goal is to provide means for quick and accurate verification of information, reduce the impact of disinformation campaigns and increase media literacy of the population. Research tasks included the development of algorithms for the analysis of textual information, the creation of a database of fakes, and the development of an interface for convenient access to analytical tools. The object of the study was the process of spreading information in the media space, and the subject was methods and means for identifying disinformation. The scientific novelty of the project consists of the development of algorithms adapted to the peculiarities of the Ukrainian language, which allows for more effective work with local content and ensures higher accuracy in identifying fake news. Also, the significance of the project is enhanced by its practical value, as the developed tools can be used by government structures, media organizations, educational institutions and the public to increase the level of information security. Thus, the development of this project is of great importance for increasing Ukraine's resilience to information threats and forming an open, transparent information society.
Бесплатно
Статья научная
Millimeter wave communication suffers from static blockages such as trees, buildings and so on. Reconfigurable Intelligent Surfaces (RISs) has been adapted to solve this blockage problem and enable the urban environment user to choose mmW enabled small cells as their source transmitter or to choose macro cells in case of non-line of sight exists. RIS is a promising network technology to improve the quality of service parameters such as spectral efficiency and energy efficiency by artificially reconfiguring the propagation environment of electromagnetic waves. An indoor user can be connected with mmW band if the line of sight (LOS) link exists. Otherwise, the system utilizes RIS transmission model to have reliable and low-latency communication. It reflects the capability of RISs to enable enhanced communications in challenging environments. An optimization problem is formulated to maximize the sum data rate of an indoor user by phase shift optimization at the RIS. The outage probability of the proposed scheme is analyzed under Rician fading channel. The proposed RIS enabled method targets to enhance the overall performance in terms of average spectral efficiency and achievable data rate in the presence of blockages and system imperfections. The data rate is increased by three fold times than that of the transmission without RIS. The utility of this framework is discussed for both indoor and outdoor environments.
Бесплатно
Reduced complexity FSD algorithm based on noise variance
Статья научная
Multiple-input multiple-output (MIMO) system has very high spectrum efficiency. However, detection is a major challenge for the utilization of MIMO system. But even the fixed sphere decoding (FSD), which is known for its simplicity in calculation, requests too much computation in high order modulation and large number antenna system, especially for mobile battery-operated devices. In this paper, a reduced FSD algorithm is proposed to simplify the calculation complexity of the FSD while maintaining the performance at the same time. Simulation results show the effect of the proposed algorithm. Especially the results in a 4×4 64QAM system show that up to 81.2% calculation can be saved while the performance drop is less than 0.1dB when SNR=30.
Бесплатно
Статья научная
There are billions of inter-connected devices by the help of Internet-of-Things (IoT) that have been used in a number of applications such as for wearable devices, e-healthcare, agriculture, transportation, etc. Interconnection of devices establishes a direct link and easily shares the information by utilizing the spectrum of cellular users to enhance the spectral efficiency with low power consumption in an underlaid Device-to-Device (D2D) communication. Due to reuse of the spectrum of cellular devices by D2D users causes severe interference between them which may impact on the network performance. Therefore, we proposed a Q-Learning based low power selection scheme with the help of multi-agent reinforcement learning to detract the interference that helps to increase the capacity of the D2D network. For the maximization of capacity, the updated reward function has been reformulated with the help of a stochastic policy environment. With the help of a stochastic approach, we figure out the proposed optimal low power consumption techniques which ensures the quality of service (QoS) standards of the cellular devices and D2D users for D2D communication in 5G Networks and increase the utilization of resources. Numerical results confirm that the proposed scheme improves the spectral efficiency and sum rate as compared to Q-Learning approach by 14% and 12.65%.
Бесплатно
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
Статья научная
In this paper, we introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Our approach is to swap Directed Diffusion reinforcement rule which means that the good route is excluded and the bad route is included. Moreover, our attack is activated and deactivated periodically to prolong its lifetime and hence brings down the target network. For the proposed attack, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.
Бесплатно
Статья научная
The work carried out in this paper first generates all edge-disjoint minimal paths between every pair of nodes of the interconnection network. Then the merging of the edge disjoint minimal paths from each source nodes to the rest of nodes occurs only if such merging of minimal paths does not result into cycle. Thus, the merging operation ensures connectivity of all nodes of interconnection network without any cycle which is equivalent to the generation of spanning trees. In this manner, a number of spanning tree rooted on each source node are generated and ranked according to their generation. The network reliability is then evaluated from these spanning trees by applying sum of disjoint product techniques on these trees. A mathematical model followed by an algorithm is proposed in this paper. The proposed method is well illustrated by taking a suitable example network. The simulated results obtained from the proposed method are validated against existing method. The validation results show a tolerable level discrepancy in estimating the network reliability of some benchmark networks while using a very less number of spanning trees in leu of all possible spanning tress. The network reliability of some important interconnection networks viz. Hypercube, crossed cube, folded hypercube, mesh and torus are evaluated and analyzed. The network reliability of fully connected network with size varying from 3 to 10 are evaluated and analysed.
Бесплатно
Reliable Data Delivery Using Fuzzy Reinforcement Learning in Wireless Sensor Networks
Статья научная
Wireless sensor networks (WSNs) has been envisioned as a potential paradigm in sensing technologies. Achieving energy efficiency in a wireless sensor network is challenging since sensor nodes have confined energy. Due to the multi-hop communication, sensor nodes spend much energy re-transmitting dropped packets. Packet loss may be minimized by finding efficient routing paths. In this research, a routing using fuzzy logic and reinforcement learning procedure is designed for WSNs to determine energy-efficient paths; to achieve reliable data delivery. Using the node’s characteristics, the reward is determined via fuzzy logic. For this paper, we employ reinforcement learning to improve the rewards, computed by considering the quality of the link, available free buffer of node, and residual energy. Further, simulation efforts have been made to illustrate the proposed mechanism’s efficacy in energy consumption, delivery delay of the packets, number of transmissions and lifespan.
Бесплатно
Reliable and Power Efficient Routing Protocol for MANETs
Статья научная
In this paper, we focused on of the most proliferated network that is Mobile Adhoc Network (MANET). Due to the dynamic nature and limited power of nodes, the routes will fail frequently which intern cause high power dissipation. This paper proposed a reliable and power efficient routing with the nodes having high power level. As well as, this approach also concentrated on the reduction of power consumption during route failures by adapting an on-demand local route recovery mechanism through a set of helping nodes and they are called as Support Nodes (SN). The cooperation of support nodes will reduce the power consumption and significantly increases the reliability. The performance of proposed approach was evaluated through average energy consumption, packet delivery ratio and end-to-end delay over varying node speed and varying packet size. The power optimization and reliability achieved by the proposed approach gives an ideal solution to the future communication in MANETs for a long time.
Бесплатно
Research of Emergency Vehicles Information System Based on SOA
Статья научная
Using Service-Oriented Architecture (SOA) to build an information system is a hot topic at present. The primary goal of this paper is to investigate how to build a SOA-based information system in a special industry-the field of emergency vehicles in environment protection industry. The paper provides a presentation of current compositions of the emergency vehicles information system and then gives out the system structure. The paper proceeds with the business process flow and working principle of an emergency vehicle information system. A service-oriented architecture framework for emergency vehicles information system is proposed.
Бесплатно