J. Networks最新文献

筛选
英文 中文
A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags 基于部分标识符的EPCglobal类-1 Gen-2标签轻量级认证协议
J. Networks Pub Date : 2015-06-29 DOI: 10.4304/jnw.10.6.369-375
Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang
{"title":"A Lightweight Authentication Protocol Based on Partial Identifier for EPCglobal Class-1 Gen-2 Tags","authors":"Zhicai Shi, Fei Wu, Yongxiang Xia, Yihan Wang, Jian Dai, Changzhi Wang","doi":"10.4304/jnw.10.6.369-375","DOIUrl":"https://doi.org/10.4304/jnw.10.6.369-375","url":null,"abstract":"RFID is a key technology that can be used to create the pervasive society. The tag is an important part of the RFID system and most popular tags are some low-cost passive tags. These tags have limited computing and storing resources, and no more attentions are paid to their security and privacy. So the application of these tags is not secure. Lightweight authentication protocols are considered as an effective method to solve the security and privacy of low-cost RFID tags. We propose a novel lightweight authentication protocol by means of some functions provided by EPCglobal Class-1 Gen-2 tags. The protocol enhances the difficulty to reveal the tag’s secrecy by using the tag’s partial identifier to generate the session messages between the tag and the reader. The tag’s partial identifier is generated randomly for each authentication. Otherwise, the tag’s identifier is randomly divided into two separate parts so as to avoid colliding from the 16-bit cyclic redundancy coding function. Some random numbers, which are generated by the tag and the reader respectively, randomize the session messages between the tag and the reader so as to resist against tracing attack and replay attack. Our proposed protocol can assure forward security and it can resist against de-synchronized attack. This protocol only uses some lightweight functions and it is very suitable to low-cost RFID tags","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"57 1","pages":"369-375"},"PeriodicalIF":0.0,"publicationDate":"2015-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74790379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fair Relay Selection Based on Mapping Functions in the Dual Hop DF Cooperative Networks 双跳DF合作网络中基于映射函数的公平中继选择
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.302-310
Kun Xiao, Cailing Qin, C. Tan, Lili Liao, Chong Dang
{"title":"A Fair Relay Selection Based on Mapping Functions in the Dual Hop DF Cooperative Networks","authors":"Kun Xiao, Cailing Qin, C. Tan, Lili Liao, Chong Dang","doi":"10.4304/jnw.10.5.302-310","DOIUrl":"https://doi.org/10.4304/jnw.10.5.302-310","url":null,"abstract":"We address the load balance, referred as “fairness” in our work, in the relay selection procedure of the dual hop decode-and-forward (DF) cooperative networks. Firstly, the unfairness caused by the known best-path relay selection (BRS) scheme is analyzed by the metric of blocking probability at the relays with equal relay channels. Secondly, aiming to improve the fairness while keeping a satisfied and comparable outage performance, we propose a fair relay selection algorithm based on mapping functions, including the signal to noise ratio (SNR) mapping functions and load mapping functions. It is worth mentioning that BRS scheme can be viewed as a special case of the proposed algorithm. Afterwards, the outage probability of the proposed algorithm is derived. During the derivation, the mixture Gamma distribution is used to model SNRs of wireless fading channels, so this kind of derivation is valid for different fading channels, e.g. Rayleigh, Nakagami-m etc.. Finally, taking the average load and outage probability as performance metrics, we simulated the proposed algorithm and compared it with the proportional fair cooperation (PFC) algorithm in the literature. As observed in the simulation results, the proposed algorithm guarantees fairness well among the relays, especially when the network is heavily burdened","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"95 1","pages":"302-310"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73141193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers 云计算数据中心节能多级网络资源管理
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.273-280
Y. Jararweh, H. Ababneh, M. Alhammouri, L. Tawalbeh
{"title":"Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers","authors":"Y. Jararweh, H. Ababneh, M. Alhammouri, L. Tawalbeh","doi":"10.4304/jnw.10.5.273-280","DOIUrl":"https://doi.org/10.4304/jnw.10.5.273-280","url":null,"abstract":"Energy efficiency is a major issue in Cloud computing infrastructure. The large power consumption is mainly attributed to the large number of modern data centers operating within. Developing these data centers includes dynamically expanding their infrastructures to meet the ever-increasing demand for huge computation, large storage, and massive communication. Energy conservation through optimization of resources and management policies in the Cloud are a viable solution. Using virtualization to save power and employing such practices as using Virtual Machines (VMs), Server Consolidation, and VM Live Migration. This paper investigates the opportunities for Green Cloud Computing (GCC) to obtain a more comprehensive prospect towards achieving energy efficient Cloud Computing, and presents an energy efficient network resources management approach in an Infrastructure as a Service (IaaS) Cloud model. We focus on developing an energy efficient algorithm by proposing a practical multi-level Cloud Resource-Network Management (CRNM) algorithm, which is implemented in a virtual Cloud environment using Snooze framework as the Cloud energy efficiency manager. The optimization focuses on the utilization of network bandwidth as main resource under test, while also taking into account the other resources, such as CPU and memory, to get the desired performance. We choose a fat tree topology as a common three tier architecture for Cloud data canters. We conclude that our proposed algorithm will save up to 75% of power consumption in Cloud data centers, with an observed increase in efficiency compared to Non-Power Aware (NPA), Power aware(PA), and Greedy algorithms, where network elements consume about 30% of the total power of Cloud data centers.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"45 1","pages":"273-280"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85108690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping 比较回顾:用于原型设计的精确OpenFlow仿真工具
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.322-327
Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun
{"title":"A Comparative Review: Accurate OpenFlow Simulation Tools for Prototyping","authors":"Pakawat Pupatwibul, Ameen Banjar, A. A. Sabbagh, R. Braun","doi":"10.4304/jnw.10.5.322-327","DOIUrl":"https://doi.org/10.4304/jnw.10.5.322-327","url":null,"abstract":"Several Simulation and emulation tools such as the OMNeT++ INET Framework and Mininet have been developed to evaluate the performance of Software-Defined Networking (SDN). A major challenge is how to analyse the obtained performance results of data transmission for these tools. These challenges include scaling to large networks, testing the correctness and evaluating the performance with the ability to easily migrate to a real system with minimal changes for deployment. Current methods for testing the functions and evaluating the performances of SDN include new programming languages, static analysis and debugging capability, and innovative frameworks of simulation tools. In this paper, we describe the implementation model of OpenFlow system in the INET framework for OMNeT++. The simulation approaches were designed for prototyping and evaluating new SDN-based applications accurately at low cost, while being flexible, scalable, controllable, and accessible to many users. We describe the design and the use of the simulation modules, and demonstrate its capability by carrying out a series of experiments. In addition, we compare the OpenFlow functions of OMNeT++ simulator with the popular Mininet emulator in identical traffic configurations. The measurement results derived from both tools show that they are correct, accurate, and repeatable regarding their capabilities, performance, and functionalities","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"17 1","pages":"322-327"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73245884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Distance based Reliable and Energy Efficient (DREE) Routing Protocol for Underwater Acoustic Sensor Networks 基于距离的水声传感器网络可靠节能路由协议
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.311-321
M. Tariq, M. Latif, M. Ayaz, Yahaya Coulibaly, Nadera Al-Areqi
{"title":"Distance based Reliable and Energy Efficient (DREE) Routing Protocol for Underwater Acoustic Sensor Networks","authors":"M. Tariq, M. Latif, M. Ayaz, Yahaya Coulibaly, Nadera Al-Areqi","doi":"10.4304/jnw.10.5.311-321","DOIUrl":"https://doi.org/10.4304/jnw.10.5.311-321","url":null,"abstract":"The distinctive features of Underwater Acoustic Sensor Networks (UW-ASN) such as high propagation delay, asymmetric channels, high errors rates and limited bandwidth cause significant issues due to the use of acoustic medium as a method of communication. Therefore, designing an efficient underwater protocol that make efficient use of available battery resources and provides reliability in unreliable acoustic environment is a challenging task. In this paper, we therefore present a distance based reliable and energy efficient routing protocol (DREE). The contribution in this routing protocol is twofold 1) DREE actually takes in to account physical distance unlike similar protocol R-ERP 2 R where physical distance has not been utilized 2) DREE utilizes Fuzzy logic based link Quality Estimator (F-LQE) which has not been put on the test before in underwater networks. Moreover, DREE extends network lifetime not only by providing energy balancing but by reducing number of transmissions required to deliver a packet successfully. Experiments performed in NS2 simulator prove that DREE contributes to improve results in comparison with R-ERP 2 R which is the similar and only distance based reliable protocol present in literature and well known depth based routing protocol DBR","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"31 1","pages":"311-321"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90688335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Forensics of Random-UDP Flooding Attacks 随机udp泛洪攻击取证
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/JNW.10.5.287-293
Anchit Bijalwan, M. Wazid, E. Pilli, R. Joshi
{"title":"Forensics of Random-UDP Flooding Attacks","authors":"Anchit Bijalwan, M. Wazid, E. Pilli, R. Joshi","doi":"10.4304/JNW.10.5.287-293","DOIUrl":"https://doi.org/10.4304/JNW.10.5.287-293","url":null,"abstract":"Internet has great impact on various facets of everyone’s life. With the enormous advantage Internet provides to users all around the world, it has some inherent weaknesses because of the protocol stack on which it is built. It can be easily attacked by attackers who exploit the vulnerabilities in the protocols and compromise systems and remotely control them to do further damage. Major attacks are focused on confidentiality, integrity and availability of data or resources. Flooding attack is one such resource availability attack which is a great cause of concern. Hackers can use the flooding attacks and cause Distributed Denial of Service (DDoS) attack with ease. With the increase and variations in the attack mode makes the investigation of these attacks essential. Random-UDP flooding attack is a different type of attack in which the attacker sends multiple UDP datagrams of different sizes at a time. This causes denial of service to the system and its resources. In this paper, we have proposed a technique for the forensics of Random-UDP flooding attack. We have tried to get as close as possible to the source of such attacks. The proposed technique is capable to identify the source of Random-UDP flooding bot attack.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"183 1","pages":"287-293"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80433633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Advance procedure for resource reservation QoSNSLP Signaling based 基于QoSNSLP信令的资源预留高级流程
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.281-286
Abdelkarim Taam, Hjiaj Hassane, S. E. Ouatik, M. Oumsis, B. Raouyane
{"title":"Advance procedure for resource reservation QoSNSLP Signaling based","authors":"Abdelkarim Taam, Hjiaj Hassane, S. E. Ouatik, M. Oumsis, B. Raouyane","doi":"10.4304/jnw.10.5.281-286","DOIUrl":"https://doi.org/10.4304/jnw.10.5.281-286","url":null,"abstract":"“Advance procedure for resource reservation QoSNSLP Signaling based” By TAAM Abdelkarim, HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim Journal of Networks Volume 10, Number 5, May 2015, Page(s): 281-286 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, the above paper has been found to be in violation of Academy Publisher’s Publication Principles. The first author (TAAM Abdelkarim) has taken full responsibility and this violation was done without the knowledge of the rest authors (HJIAJ Hassane, Said El Alaoui Oua Stiikg,n OalUinMg SbIaSs eMdo”h amed, RAOUYANE Brahim). This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original authors and/or paper title) and without permission: Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article: Badr Benmammar, Francine Krief, “MQoS NSLP: a mobility profile management based approach for advance resource reservation in a mobile environment,” 7th IFIP IEEE International Conference on Mobile and Wireless Communications Networks (MWCN 2005) , Marrakech, Morocco, 2005.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"1 1","pages":"281-286"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89699311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Downlink Interference Analysis in LTE-Femtocell Networks lte -飞蜂窝网络下行链路干扰分析
J. Networks Pub Date : 2015-05-27 DOI: 10.4304/jnw.10.5.294-301
Nirmala Sivaraj, P. Palanisamy
{"title":"Downlink Interference Analysis in LTE-Femtocell Networks","authors":"Nirmala Sivaraj, P. Palanisamy","doi":"10.4304/jnw.10.5.294-301","DOIUrl":"https://doi.org/10.4304/jnw.10.5.294-301","url":null,"abstract":"Aiming to cope up with relentless wireless traffic and improving link quality against high wall penetration loss, Third Generation Partnership Project proposed the heterogeneous deployment of low power indoor hot spots such as Femtocell Access Points (FAPs) over the existing cellular network topology. In this two-tier heterogeneous network (HetNet) where femtocells coexist with macrocell, the FAPs may spatially reuse the spectrum assigned to macrocell base station in an unplanned way and the mitigation of the generated co-channel interference becomes a major challenge. The problem is more severe with FAPs operating in a closed access mode, particularly in urban and sub-urban environment. In this work, the impact of interference in downlink on quality of service to macro user and femto user is analyzed by modeling the Signal-to-Interference and Noise Ratio and achieved user throughput. Simulation results show significant reduction of achieved user throughput and creation of coverage holes because of interference. It is clear that the performance of restricted access FAPs under co-channel operation need to be explicitly accounted for and optimized against both cross-tier and co-tier interference","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"274 1","pages":"294-301"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80008810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Low Latency Software Routers 迈向低延迟软件路由器
J. Networks Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.188-200
Torsten M. Runge, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle
{"title":"Towards Low Latency Software Routers","authors":"Torsten M. Runge, Daniel Raumer, F. Wohlfart, B. Wolfinger, G. Carle","doi":"10.4304/jnw.10.4.188-200","DOIUrl":"https://doi.org/10.4304/jnw.10.4.188-200","url":null,"abstract":"Network devices based on commodity hardware are capable of high-speed packet processing while maintaining the programmability and extensibility of software. Thus, software-based network devices, like software routers, software-based firewalls, or monitoring systems, constitute a cost-efficient and flexible alternative to expensive, special purpose hardware. The overall packet processing performance in resource-constrained nodes can be strongly increased through parallel processing based on off-theshelf multi-core processors. However, synchronization and coordination of parallel processing may counteract the corresponding network node performance. We describe how multi-core software routers can be optimized for real-time traffic by utilizing the technologies available in commodity hardware. Furthermore, we propose a low latency extension for the Linux NAPI. For the analysis, we use our approach for modeling resource contention in resource-constrained nodes which is also implemented as a resource-management extension module for ns-3. Based on that, we derive a QoSaware software router model which we use to evaluate our performance optimizations. Our case study shows that the different scheduling strategies of a software router have significant influence on the performance of handling realtime traffic.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"173 1","pages":"188-200"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77290626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Approach to Indoor Sensor Area Localization and Coverage 一种室内传感器区域定位与覆盖的混合方法
J. Networks Pub Date : 2015-04-14 DOI: 10.4304/jnw.10.4.209-221
M. Gai, A. Azadmanesh, A. Rezaeian
{"title":"A Hybrid Approach to Indoor Sensor Area Localization and Coverage","authors":"M. Gai, A. Azadmanesh, A. Rezaeian","doi":"10.4304/jnw.10.4.209-221","DOIUrl":"https://doi.org/10.4304/jnw.10.4.209-221","url":null,"abstract":"This study presents a hybrid approach to indoor object detection and tracking. A test area is partitioned into regions that are covered by sensors placed on the ceilings. The region location of an object is determined by these sensors using RSSI. The region determination is then followed by the exact localization of the object within the region using Building Information Modeling (BIM) and the 3D stereo image measurements. To determine the coverage ratio of a region for better placement of sensors, the 3D space is partitioned into 2D planes whose coverage points are determined by a newly developed software product called LOCOPac. Other than indoor localization, some simulation results of sensor distribution algorithms that are more suitable for outdoor applications will also be presented. Based on the experimental and simulation results, the proposed approach to indoor localization and LOCOPac has the potential to be used for real world applications.","PeriodicalId":14643,"journal":{"name":"J. Networks","volume":"62 1","pages":"209-221"},"PeriodicalIF":0.0,"publicationDate":"2015-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73503021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信