Int. J. Interdiscip. Telecommun. Netw.最新文献

筛选
英文 中文
Orphan Node Connected Management in Multi-Hop Clustering-Based Routing Protocols for Wireless Sensor Networks 基于多跳集群的无线传感器网络路由协议中的孤儿节点连接管理
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100101
Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi
{"title":"Orphan Node Connected Management in Multi-Hop Clustering-Based Routing Protocols for Wireless Sensor Networks","authors":"Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi","doi":"10.4018/IJITN.2019100101","DOIUrl":"https://doi.org/10.4018/IJITN.2019100101","url":null,"abstract":"In distributed clustering protocols, the selection of a cluster head CH presents a major constraint to the proper functioning of the network. Generally, the process begins with a random choice of CHs at the time of cluster formation. A selective process is then used based on a probabilistic or iterative calculation in order to choose the different CHs. This approach leads to a non-uniform distribution of the different CHs. Indeed, in some cycles, the CHs may be concentrated in a part of the monitored area, some CH nodes fail to reach its neighbor CH. They are considered as isolated nodes in the network. The major contribution of this article is to propose a solution to maximize the number of nodes connected to the networks, in order to have an improved connectivity. However, the coverage of the entire monitored area can provide persistent information to WSN applications. The work in this paper resulted in the design and development of a new distributed clustering protocol called Orphan_Nodes_Connected (ONC) protocol that significantly improves the connectivity of the monitored area.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks 一种新的Ad-Hoc网络AOMDV生存期延长路由算法
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100104
I. Baddari, M. A. Riahla, M. Mezghiche
{"title":"A New AOMDV Lifetime Prolonging Routing Algorithm for Ad-Hoc Networks","authors":"I. Baddari, M. A. Riahla, M. Mezghiche","doi":"10.4018/IJITN.2019100104","DOIUrl":"https://doi.org/10.4018/IJITN.2019100104","url":null,"abstract":"Network lifetime is a key design metric in MANETs, it is considered as one of the most important parameters algorithms to be used in ad hoc networks. Each network node works completely independently and acts as a router for relaying communications. If some nodes die prematurely because of battery depletion, the network lifetime will be adversely affected, and the network will get disconnected. This article presents AOMDV-LP, a new AOMDV lifetime-prolonging routing algorithm for MANETs. This new algorithm helps to maximize the network lifetime by managing nodes energy, link cost and controlling the networks congestion. Simulations quantify the performance gains of the authors algorithm.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Assertion of IoT Devices Using Cloud of Things Perception 使用物联网云感知的物联网设备的安全断言
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-10-01 DOI: 10.4018/IJITN.2019100102
Mamata Rath, Bibudhendu Pati
{"title":"Security Assertion of IoT Devices Using Cloud of Things Perception","authors":"Mamata Rath, Bibudhendu Pati","doi":"10.4018/IJITN.2019100102","DOIUrl":"https://doi.org/10.4018/IJITN.2019100102","url":null,"abstract":"Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132210585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Switching-Based and Delay-Aware Scheduling Algorithm for Cognitive Radio Networks 一种基于交换的认知无线网络延迟感知调度算法
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070104
O. Sweileh, Mohamed S. Hassan, H. Mir, M. H. Ismail
{"title":"A Switching-Based and Delay-Aware Scheduling Algorithm for Cognitive Radio Networks","authors":"O. Sweileh, Mohamed S. Hassan, H. Mir, M. H. Ismail","doi":"10.4018/IJITN.2019070104","DOIUrl":"https://doi.org/10.4018/IJITN.2019070104","url":null,"abstract":"In this article, an opportunistic inter-frame spectrum scheduler that maximizes the throughput of cognitive radio networks over a span of multiple time-slots is proposed. An optimization problem is formulated to find the optimum inter-frame scheduler while taking into account the switching delay, the primary user (PU) activity, historical information on the PU behavior, the channel quality as well as the secondary user (SU) status. Simulation results show that the proposed inter-frame scheduler significantly improved the overall aggregate throughput and average switching delay of the cognitive radio network when compared to the values obtained when scheduling is done on a slot-by-slot basis.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating High Throughput Cipher Processing on Supercomputing Platform 在超级计算平台上加速高吞吐量密码处理
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070102
Hao Wang, Jingfei Jiang
{"title":"Accelerating High Throughput Cipher Processing on Supercomputing Platform","authors":"Hao Wang, Jingfei Jiang","doi":"10.4018/IJITN.2019070102","DOIUrl":"https://doi.org/10.4018/IJITN.2019070102","url":null,"abstract":"The supercomputing platform is suitable for the acceleration of high throughput computing intensive applications, due to the difficulty of mathematical calculation and the communication of multi-user large data volumes, the throughput rate requirement of computing equipment in various cipher processing related applications is very high. In order to accelerate the operation of the application of high throughput cipher processing, this article proposes a coarse-grained parallel acceleration framework for MIC of supercomputing platform. The framework does not take the computing process of the algorithm into account, but achieves parallel computing by assigning the data to each computing node. The framework adopts a three-level parallel structure to accelerate the application of cipher processing, namely multi-node, multi-MIC of nodes, and multi-thread of MICs. The experimental results for a variety of cipher processing applications show that the framework applies coarse-grained parallel processing to the applications of high throughput cipher processing by supercomputing platform, and obtains the significant acceleration effect.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124774060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Influencing the PAPR Performance of OFDM and MIMO-OFDM Systems: A Comparison Study 影响OFDM与MIMO-OFDM系统PAPR性能的因素比较研究
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070103
Tahreer Mahmood, S. Mohan
{"title":"Factors Influencing the PAPR Performance of OFDM and MIMO-OFDM Systems: A Comparison Study","authors":"Tahreer Mahmood, S. Mohan","doi":"10.4018/IJITN.2019070103","DOIUrl":"https://doi.org/10.4018/IJITN.2019070103","url":null,"abstract":"Multiple-input multiple-output technology together with orthogonal frequency division multiplexing (MIMO-OFDM) is an effective technique to combat multi-channel fading and to improve bandwidth efficiency. Simultaneously, it also increases the system's ability to provide reliable transmission. However, the main disadvantage of OFDM is the high peak-to-average-power ratio (PAPR), which, if not mitigated, will negatively impact practical applications. The high PAPR increases complexity and Bit Error Rate. In this research, the authors investigate the factors influencing the PAPR performance of both OFDM and MIMO-OFDM systems. The objective of this research is to make researchers in this field become familiar with this problem as well as to impart an understanding of the factors that influence PAPR. In this study, the authors classify the factors that impact PAPR into modulation schemes and a number of sub-carriers. These parameters influence the PAPR performance have been analyzed and simulated by using MATLAB. It is observed that the numbers of sub-carriers have a great effect on the PAPR performance. However, modulation schemes can have a small effect on PAPR performance.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132251524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains 移动IPv6代理域内或域间避免重复认证的切换算法
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-07-01 DOI: 10.4018/IJITN.2019070101
Hewei Yu, Ziliang Li
{"title":"Handover Algorithm to Avoid Duplication Authentication Within or Between Proxy Mobile IPv6 Domains","authors":"Hewei Yu, Ziliang Li","doi":"10.4018/IJITN.2019070101","DOIUrl":"https://doi.org/10.4018/IJITN.2019070101","url":null,"abstract":"This article proposes an enhanced handover scheme of Proxy Mobile IPv6 (PMIPv6) which can avoid duplication authentication. In traditional handover scheme, a Mobile Node (MN) needs an authentication procedure by AAA (Authentication, Authorization and Accounting) server while it enters a PMIPv6 domain. However, when an MN moves to a new subnet in the same domain, it still needs another authentication procedure, which would increase handover latency. In the proposed scheme, an MN only needs to be authenticated once while it enters a PMIPv6 domain, and a Mobile Access Gateway (MAG) that an MN is attached to will send the authentication information to the New MAG (NMAG) which MN will access to before the MN's handover. So that MN can skip the second authentication. The authors build a test-bed and have done some tests. Result shows that this scheme has got improvement in decreasing handover latency.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129979866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks 车辆自组织网络中集中式TDMA调度机制的信任框架
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-04-09 DOI: 10.4018/ijitn.2020100106
Mohamed Hadded, Khalifa Toumi, A. Laouiti, P. Mühlethaler
{"title":"A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks","authors":"Mohamed Hadded, Khalifa Toumi, A. Laouiti, P. Mühlethaler","doi":"10.4018/ijitn.2020100106","DOIUrl":"https://doi.org/10.4018/ijitn.2020100106","url":null,"abstract":"Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. In such networks, communication is possible both between the vehicles themselves and between the vehicles and the infrastructure. These applications need a reliable and secure broadcast system that takes into consideration the security issues in VANETs, the high speed of nodes, and the strict QoS requirements. For these reasons, the authors propose a trust-based and centralized TDMA-based MAC protocol that avoids time slot assignment to malicious nodes and minimizes message collision. The solution is based on the design of a generic trust mechanism for VANETs based on the MAC requirements and its integration into a centralized TDMA-based MAC protocol, named trust-CTMAC. The mechanism will permit roadside units (RSUs) to manage trust level assignment via security check during free slot allotment. The experiments carried out and the results obtained prove the effectiveness of the approach.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129561259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling an Intrusion Detection System Based on Adaptive Immunology 基于自适应免疫学的入侵检测系统建模
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-04-01 DOI: 10.4018/IJITN.2019040104
V. Alaparthy, S. Morgera
{"title":"Modeling an Intrusion Detection System Based on Adaptive Immunology","authors":"V. Alaparthy, S. Morgera","doi":"10.4018/IJITN.2019040104","DOIUrl":"https://doi.org/10.4018/IJITN.2019040104","url":null,"abstract":"Network security has always has been an area of priority and extensive research. Recent years have seen a considerable growth in experimenting with biologically inspired techniques. This is a consequence of the authors increased understanding of living systems and the application of that understanding to machines and software. The mounting complexity of telecommunications networks and the need for increasing levels of security have been the driving factors. The human body can act as a great role model for its unique abilities in protecting itself from external entities owing to its diverse complexities. Many abnormalities in the human body are similar to that of the attacks in wireless sensor networks (WSN). This article presents the basic ideas that can help modelling a system to counter the attacks on a WSN by monitoring parameters such as energy, frequency of data transfer, data sent and received. This is implemented by exploiting an immune concept called danger theory, which aggregates the anomalies based on the weights of the anomalous parameters. The objective is to design a cooperative intrusion detection system (IDS) based on danger theory.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132883070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Low Power IoT Medium Access Control for Receiver-Assigned CDMA 基于接收机分配的低功耗物联网介质接入控制
Int. J. Interdiscip. Telecommun. Netw. Pub Date : 2019-04-01 DOI: 10.4018/IJITN.2019040103
E. E. Petrosky, Alan J. Michaels, J. Ernst
{"title":"A Low Power IoT Medium Access Control for Receiver-Assigned CDMA","authors":"E. E. Petrosky, Alan J. Michaels, J. Ernst","doi":"10.4018/IJITN.2019040103","DOIUrl":"https://doi.org/10.4018/IJITN.2019040103","url":null,"abstract":"Low power, low cost, and security-conscious wireless sensor networks are becoming increasingly pervasive in the internet of things (IoT). In these networks, receiver-assigned code division multiple access (RA-CDMA) offers benefits over existing multiple access techniques. RA-CDMA networks are asynchronous, robust against multipath interference, and offer resilience against collision. A lightweight medium access control (MAC) protocol is needed to facilitate communication in RA-CDMA networks between low power sensor nodes and access points. This article provides an overview of RA-CDMA and proposes elements of a new MAC protocol that could improve performance of certain wireless sensor networks. Key features of the proposed MAC design are introduced and compared to those of existing protocols, highlighting its simple and lightweight design. Through its compatibility with RA-CDMA, the MAC design eliminates significant overhead and complexity while meeting requirements for low power networks, which enables the implementation of dense IoT sensor networks.","PeriodicalId":120331,"journal":{"name":"Int. J. Interdiscip. Telecommun. Netw.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117102213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信