Int. J. Commun. Networks Distributed Syst.最新文献

筛选
英文 中文
Wireless sensor network monitoring system: architecture, applications and future directions 无线传感器网络监控系统:架构、应用及未来发展方向
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-09-20 DOI: 10.1504/ijcnds.2019.10024114
M. Abdelhafidh, M. Fourati, L. Chaari, Abdessalam Chouaya
{"title":"Wireless sensor network monitoring system: architecture, applications and future directions","authors":"M. Abdelhafidh, M. Fourati, L. Chaari, Abdessalam Chouaya","doi":"10.1504/ijcnds.2019.10024114","DOIUrl":"https://doi.org/10.1504/ijcnds.2019.10024114","url":null,"abstract":"Wireless sensor network monitoring systems (WSNMS) have emerged as one of the most promising research area due to reliable technology progress related to the deployed sensors. This solution is efficiently involved with advanced technologies such as internet of things (IoT) and physical cyber system (CPS) that are designed as a bridge connecting the real world to the digital world. This survey gives a holistic view of WSNMS based on a recent state of the art. We address WSNMS applications and its challenges to facilitate its deployment in real world. We demonstrate the synergy between WSN and the information and communication technologies (ICT) and its major specifications. Finally, we depict open research issues that need to be more studied in the future. We expect to help researchers to get basic knowledge on WSNMS and to open for them new opportunities in regards to understand new technologies considered as an evolution of WSN.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123989479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Modelling and performance evaluation over Nakagami-m/log-normal fading environments Nakagami-m/log-normal衰落环境的建模与性能评价
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-09-20 DOI: 10.1504/ijcnds.2019.10024113
P. K. Verma, S. Soni, P. Jain
{"title":"Modelling and performance evaluation over Nakagami-m/log-normal fading environments","authors":"P. K. Verma, S. Soni, P. Jain","doi":"10.1504/ijcnds.2019.10024113","DOIUrl":"https://doi.org/10.1504/ijcnds.2019.10024113","url":null,"abstract":"In this paper, we present the closed-form expressions of composite Nakagami-m/log-normal (NL) fading channel by Holtzman approximation. The obtained expressions are used to derive the important performance parameters of wireless communications systems. These performance matrices are amount of fading (AF), outage probability (PO), average channel capacity (CC) and average symbol error probability (ASEP) of coherent modulation comprising binary orthogonal, antipodal, M-ary phase shift keying (M-PSK) and M-ary pulse amplitude modulation (M-PAM). Furthermore, energy detection (ED) is one of the ways to determine whether the signal is present or not. The performance of ED is studied in terms of complementary receiver operating characteristics (CROC) curve. To verify the correctness of our analysis, the derived closed-form expressions are corroborated via exact result and Monte Carlo simulations.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating the interferences and intruders in cognitive radio networks using an authentication protocol over Reed-Solomon codes 基于里德-所罗门码的身份验证协议减轻认知无线网络中的干扰和入侵者
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-09-20 DOI: 10.1504/ijcnds.2019.10024116
C. P. Kumar, R. Selvakumar
{"title":"Mitigating the interferences and intruders in cognitive radio networks using an authentication protocol over Reed-Solomon codes","authors":"C. P. Kumar, R. Selvakumar","doi":"10.1504/ijcnds.2019.10024116","DOIUrl":"https://doi.org/10.1504/ijcnds.2019.10024116","url":null,"abstract":"Cognitive radio networks have emerged as a promising solution for spectrum scarcity problem. Secondary users (unlicensed users) accessing cognitive radio network suffer from continuous unintentional interference from primary users (licensed users). Also, the adversary present in the channel tries to thwart the secondary users' communication. To address these two problems, an inherent authentication protocol is defined over Reed-Solomon codes. Reed-Solomon codes with authentication protocol are used with M-ary frequency shift keying modulation technique, for transmissions over cognitive radio network. Similarly, the received message is demodulated and decoded to get the original information bits at the receiver. The performance of the proposed scheme is given in terms of bit error rate. The experimental results show that the proposed system performs better in terms of BER reduction. Also, it is shown that the proposed scheme is resistant to replay attack, man-in-the-middle and impersonation kind of attacks.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130823370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality of service class mapping and scheduling scheme for converged LTE-WiFi in the next generation networks 下一代网络中融合LTE-WiFi的业务质量分类映射与调度方案
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-07-02 DOI: 10.1504/IJCNDS.2019.10022367
Amer T. Saeed, A. Esmailpour
{"title":"Quality of service class mapping and scheduling scheme for converged LTE-WiFi in the next generation networks","authors":"Amer T. Saeed, A. Esmailpour","doi":"10.1504/IJCNDS.2019.10022367","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022367","url":null,"abstract":"In this paper, a novel quality of service (QoS) class mapping and scheduling scheme for the LTE-WiFi converged network is proposed to ensure that end-to-end QoS support is provisioned seamlessly. A mapping among QoS classes of LTE and WiFi is performed first, then scheduling scheme is outlined. For scheduling scheme, traffic is separated into real-time (RT) and non-real-time (NRT) components, then a two-stage complex queuing strategy is performed. In the first stage, deficit weighted round robin queuing (DWRRQ) and class-based weighted fair queuing (CBWFQ) are used for RT and NRT applications respectively to segregate and forward traffic according to resource requirements. Whereas in the second stage, rate-control priority queuing (RCPQ) is used for all types of traffic to give each class appropriate priority level. Performance evaluation of the converged network was done based on different metrics such as jitter, end-to-end delay, throughput, and packet loss ratio. Simulation results show significant improvements for RT with slight degradation on NRT applications after using the new scheduling scheme.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-efficient real-time deployment of mobile sensors in disaster-prone location 在灾害易发地区节能实时部署移动传感器
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-07-02 DOI: 10.1504/IJCNDS.2019.10015202
Williams-Paul Nwadiugwu, Dong‐Seong Kim, Jae-Min Lee
{"title":"Energy-efficient real-time deployment of mobile sensors in disaster-prone location","authors":"Williams-Paul Nwadiugwu, Dong‐Seong Kim, Jae-Min Lee","doi":"10.1504/IJCNDS.2019.10015202","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10015202","url":null,"abstract":"Recent research works on real-time robot-assisted mobile sensor deployment have become rapid, as they tend to accomplish problem-solving tasks at both safe location and unsafe location. This paper proposes a technique to achieve a real-time energy-efficient deployment of mobile sensors in a disaster-prone location using a path-tracking algorithm. An enhanced path-tracking algorithm was introduced to be able to deploy mobile sensors in both presence and absence of obstacles. The simulation result investigates the real-time performances of the mobile sensor nodes deployment with respect to factors such as the minimal energy consumption of the nodes with neighbourhood sharing scheme, the end-to-end system threshold and the time variance for the deployed sensor nodes to reach the target location and back to the base station.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"129 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed denial of service attacks detection in cloud computing using extreme learning machine 基于极限学习机的云计算分布式拒绝服务攻击检测
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-07-02 DOI: 10.1504/IJCNDS.2019.10022365
Gopal Singh Kushwah, Syed Taqi Ali
{"title":"Distributed denial of service attacks detection in cloud computing using extreme learning machine","authors":"Gopal Singh Kushwah, Syed Taqi Ali","doi":"10.1504/IJCNDS.2019.10022365","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022365","url":null,"abstract":"Cloud computing has become popular due to its on-demand, pay-as-you-use and ubiquitous features. This technology suffers from various security risks. Distributed denial of service (DDoS) attack is one of these security risks. It is used to disrupt the services provided by cloud computing. In DDoS attack, the cloud server is overwhelmed with fake requests by the attacker. This makes long response time for legitimate users or shut down of the service completely. In this work, a DDoS attack detection model based on extreme learning machine (ELM) has been proposed. Experiments show that proposed model can be trained in a very short period of time and provides high detection accuracy.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122556857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Firefly algorithm inspired energy aware clustering protocol for wireless sensor network 基于萤火虫算法的无线传感器网络能量感知聚类协议
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-07-02 DOI: 10.1504/IJCNDS.2019.10022366
A. Bongale, C. R. Nirmala
{"title":"Firefly algorithm inspired energy aware clustering protocol for wireless sensor network","authors":"A. Bongale, C. R. Nirmala","doi":"10.1504/IJCNDS.2019.10022366","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022366","url":null,"abstract":"Most of the existing cluster-based routing protocols focus either on cluster head election schemes or on refinement of routing process ignoring process of cluster formation. In this paper, firefly algorithm inspired energy aware clustering protocol for WSN is presented. The idea of the proposed protocol is to elect the cluster head nodes by assigning them intensity value defined through firefly algorithm. Another contribution of this paper is energy efficient cluster formation where cluster members join to cluster heads based on intensity parameter associated with cluster head. The presented protocol ensures that the elected cluster heads are usually located in densely populated area of the network resulting in low distance intra-cluster data transmissions and ultimately leading to low energy consumption. The firefly-based protocol is compared with popular routing protocols such as LEACH, LEACH-C and EOICHD and comparative results indicate that proposed protocol is highly energy efficient than other protocols.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129719787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Limits of the OFDM use in the radio mobile context OFDM在无线移动环境下使用的限制
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-07-02 DOI: 10.1504/IJCNDS.2019.10022363
F. Boumediene, M. Tayebi, M. Bouziani
{"title":"Limits of the OFDM use in the radio mobile context","authors":"F. Boumediene, M. Tayebi, M. Bouziani","doi":"10.1504/IJCNDS.2019.10022363","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022363","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is very vulnerable to the carrier frequency offset (CFO) generated mainly by the Doppler effect. The inter-carrier interference (ICI) generated by this offset degrades the system performances. Before stabilising its speed, a mobile must pass through a startup phase where the speed varies gradually in time. The same thing happens during a braking; the speed varies up to a zero value. In this paper, we investigate the effect induced by these speed variations on the OFDM system performances. The weight and the speed of the degradations are taken into account for further enhancement of the performances. The limits of the OFDM modulation are depicted in the line-of-sight (LOS) path where a mobile is subject to different types of accelerations. Simulation results show clearly the sensitivity of OFDM when mobile is subject to higher values of acceleration.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128981458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and performance analysis of energy detector-based spectrum sensing with maximum ratio combining over Nakagami-m/log-normal fading channels Nakagami-m/log-normal衰落信道上基于最大比值组合的能量探测器频谱传感建模与性能分析
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-07-02 DOI: 10.1504/IJCNDS.2019.10022364
P. K. Verma, Rahul Kumar
{"title":"Modelling and performance analysis of energy detector-based spectrum sensing with maximum ratio combining over Nakagami-m/log-normal fading channels","authors":"P. K. Verma, Rahul Kumar","doi":"10.1504/IJCNDS.2019.10022364","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10022364","url":null,"abstract":"Spectrum sensing (SS) is one of the crucial functions of cognitive radio networks (CRNs). It decides whether the band or sub-band of the spectrum is available or not for secondary users (SUs). Energy detection (ED) is one of the very fundamental approaches of SS to detect whether primary users (PUs) are present or absent. It is mathematically intractable to derive closed-form expressions of composite multipath/shadowing for average probability of detection and average area under the receiver operating characteristic curve. In this paper, we have considered Nakagami-m/log-normal as composite fading with maximum ratio combining (MRC) diversity, and it is approximated by Gaussian-Hermite integration (G-HI). In addition, adaptive threshold or optimised threshold has been incorporated to overcome the problem of spectrum sensing at low signal-to-noise ratio (SNR). To verify the correctness of exact results and obtained analytical expression is collaborated with Monte Carlo simulations.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on spectrum allocation in cognitive radio network 认知无线电网络频谱分配研究进展
Int. J. Commun. Networks Distributed Syst. Pub Date : 2019-05-29 DOI: 10.1504/IJCNDS.2019.10014474
Wangjam Niranjan Singh, N. Marchang
{"title":"A review on spectrum allocation in cognitive radio network","authors":"Wangjam Niranjan Singh, N. Marchang","doi":"10.1504/IJCNDS.2019.10014474","DOIUrl":"https://doi.org/10.1504/IJCNDS.2019.10014474","url":null,"abstract":"Cognitive radio is a recent technology that enhances the usage of spectrum resources. Efficient assignment of unused spectrum to unlicensed users is an important problem. Spectrum allocation is an important mechanism that limits and avoids the interference between cognitive radio devices and licensed primary users, thus enabling a better efficient usage of the wireless radio spectrum. In this paper, we present a study of different approaches and techniques w.r.t. spectrum allocation in cognitive radio network. We not only compare them in terms of the assignment scheme, execution model, etc. but also highlight their contributions and shortcomings. Additionally, we also highlight the security attacks on spectrum allocation. The challenges that a CR spectrum allocation technique should take into consideration are also discussed in the end with the hope of aiding future research.","PeriodicalId":209177,"journal":{"name":"Int. J. Commun. Networks Distributed Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信