Int. J. Commun. Networks Inf. Secur.最新文献

筛选
英文 中文
A Model of a Distributed Information System based on the Z39.50 Protocol 基于Z39.50协议的分布式信息系统模型
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.5122
S. Serikbayeva, J. Tussupov, M. Sambetbayeva, A. Yerimbetova, G.B. Borankulova, A. Tungatarova
{"title":"A Model of a Distributed Information System based on the Z39.50 Protocol","authors":"S. Serikbayeva, J. Tussupov, M. Sambetbayeva, A. Yerimbetova, G.B. Borankulova, A. Tungatarova","doi":"10.54039/ijcnis.v13i3.5122","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5122","url":null,"abstract":"Based on the analysis of typical scenarios of information servers, the tasks that should be solved when organizing an access control system for distributed information resources are formulated. The possibilities of the Z39.50 technologies as the most suitable for building such a system are considered. Within the framework of this technology, three access control models are discussed, which differ in the degree of integration of information server functions with the Z39.50 technologies.The creation and support of distributed information systems and electronic libraries that integrate heterogeneous information resources and operate in various software and hardware environments requires special approaches to managing these systems. If the resources or data themselves can be managed locally, even for distributed information systems, then the task of managing access to distributed resources cannot be solved within the framework of local administration. The justification of the last thesis can be seen when considering typical scenarios of the information server, which we will describe below","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132596040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Authentication Scheme for Internet of Things 一种高效的物联网认证方案
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-12-25 DOI: 10.54039/ijcnis.v13i3.3422
J. Al-Saraireh, Haya Joudeh
{"title":"An Efficient Authentication Scheme for Internet of Things","authors":"J. Al-Saraireh, Haya Joudeh","doi":"10.54039/ijcnis.v13i3.3422","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.3422","url":null,"abstract":"The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Things” have the ability to communicate, generate, transmit and store data over the network connection. During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks, loss, distortions and interruption which impair functionality, system efficiency and user satisfaction. Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner. Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol. The aim of this research is to enhance the authentication protocol, starting by reducing the heavy use of storage in “Things”, and eliminating unnecessary messages during authentication steps, taking into consideration the network security analysis. This research represents a security performance analysis and enhancement authentication for the IoT. The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125327753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of image degradation on performance of Convolutional Neural Networks 图像退化对卷积神经网络性能的影响
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4946
Inad A. Aljarrah
{"title":"Effect of image degradation on performance of Convolutional Neural Networks","authors":"Inad A. Aljarrah","doi":"10.54039/IJCNIS.V13I2.4946","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4946","url":null,"abstract":"The use of deep learning approaches in image classification and recognition tasks is growing rapidly and gaining huge importance in research due to the great enhancement they achieve. Particularly, Convolutional Neural Networks (CNN) have shown a great significance in the field of computer vision and image recognition recently. They made an enormous improvement in classification and recognition systems’ accuracy. In this work, an investigation of how image related parameters such as contrast, noise, and occlusion affect the work of CNNs is to be carried out. Also, whether all types of variations cause the same drop to performance and how they rank in that regard is considered. After the experiments were carried out, the results revealed that the extent of effect of each degradation type to be different from others. It was clear that blurring and occlusion affects accuracy more than noise when considering the root mean square error as a common objective measure of the amount of alteration that each degradation caused.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"35 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132781116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Issues and Challenges for Network Virtualisation 网络虚拟化的问题与挑战
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4990
Nikheel Tashvin Seechurn, A. Mungur, Sheeba Armoogum, S. Pudaruth
{"title":"Issues and Challenges for Network Virtualisation","authors":"Nikheel Tashvin Seechurn, A. Mungur, Sheeba Armoogum, S. Pudaruth","doi":"10.54039/IJCNIS.V13I2.4990","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4990","url":null,"abstract":"In recent years, network virtualisation has been of great interest to researchers, being a relatively new and major paradigm in networking. This has been reflected in the IT industry where many virtualisation solutions are being marketed as revolutionary and purchased by enterprises to exploit these promised performances. Adversely, there are certain drawbacks like security, isolation and others that have conceded the network virtualisation. In this study, an investigation of the different state-of-the-art virtualisation technologies, their issues and challenges are addressed and besides, a guideline for a quintessential Network Virtualisation Environment (NVE) is been proposed. A systematic review was effectuated on selectively picked research papers and technical reports. Moreover a comparative study is performed on different Network Virtualisation technologies which include features like security, isolation, stability, convergence, outlay, scalability, robustness, manageability, resource management, programmability, flexibility, heterogeneity, legacy Support, and ease of deployment. The virtualisation technologies comprise Virtual Private Network (VPN), Virtual Local Area Network (VLAN), Virtual Extensible Local Area Network (VXLAN), Software Defined Networking (SDN) and Network Function Virtualisation (NFV). Conclusively the results exhibited the disparity as to the gaps of creating an ideal network virtualisation model which can be circumvented using these as a benchmark.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme 保护视频所有权防止数字盗版:一种有效的数字水印方案
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4945
Himanshu Agarwal, Farooq Husain
{"title":"Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme","authors":"Himanshu Agarwal, Farooq Husain","doi":"10.54039/IJCNIS.V13I2.4945","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4945","url":null,"abstract":"Violation of one’s intellectual ownership rights by the others is a common problem which entertainment industry frequently faces now-a-days. Sharing of information over social media platforms such as Instagram, WhatsApp and twitter without giving credit the owner causes huge financial losses to the owner and hence needs an immediate attention. Digital watermarking is a promising technique to protect owners’ right against digital piracy. Most of the state-of-the-art techniques does not provides adequate level of resilience against majority of video specific attacks and other commonly applied attacks. Therefore, this paper proposes a highly transparent and robust video watermarking solution to protect the owners rights by first convert each video frame into YCbCr color components and then select twenty five strongest speeded-up robust features (SURF) points of the normalized luminance component as points for both watermark embedding and extraction. After applying variety of geometric, simple signal processing and video specific attacks on the watermarked video meticulous analysis is performed using popular metrics which reveals that the proposed scheme possesses high correlation value which makes it superior for practical applications against these attacks. The scheme also proposes a novel three-level impairment scale for subjective analysis which gives stable results to derive correct conclusions.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-agent Framework for dynamic traffic management Considering Priority Link 考虑优先级链路的多智能体动态流量管理框架
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4977
Abdelouafi Ikidid, A. E. Fazziki, Mohamed Sadgal
{"title":"A multi-agent Framework for dynamic traffic management Considering Priority Link","authors":"Abdelouafi Ikidid, A. E. Fazziki, Mohamed Sadgal","doi":"10.54039/IJCNIS.V13I2.4977","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4977","url":null,"abstract":"To favor emergency vehicles, promote collective modes of transport in Moroccan cities, we propose in this paper a control system to manage traffic at signalized intersections with priority links in urban settings. This system combines multi-agent technology and fuzzy logic to regulate traffic flows. The traffic system flow is divided into two types of vehicles; priority and regular vehicles. The regular vehicles can use only the regular links, while the priority vehicles may use both priority and the regular links. This approach aims to favor emergency vehicles and promote collective modes of transport, it acts on the traffic light phases length and order to control all traffic flows. We proposed a decentralized system of regulation based on real-time monitoring to develop a local inter-section state, and intelligent coordination between neighboring intersections to build an overview of the traffic state. The regulation and prioritization decisions are made through cooperation, communication, and coordination between different agents. The performance of the proposed system is investigated and instantiated in ANYLOGIC simulator, using a section of the Marrakesh road network that contains priority links. The results indicate that the designed system can significantly develop the efficiency of the traffic regulation system.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114078203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks 面向能量采集物联网网络的基于高斯函数形状的ii型模糊隶属度聚类协议
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4901
V. Bhatia, A. Girdhar, S. S. Khurmi
{"title":"Gaussian functional shapes-based type-II fuzzy membership-based cluster protocol for energy harvesting IoT networks","authors":"V. Bhatia, A. Girdhar, S. S. Khurmi","doi":"10.54039/IJCNIS.V13I2.4901","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4901","url":null,"abstract":"With the advancements in Internet of Things (IoT) technologies, energy harvesting IoT devices are becoming significantly important. These tiny IoT devices can harvest bounded energy, thus need an efficient protocol to conserve the energy in more efficient manner. From the review, it is found that the development of an efficient energy efficient protocol for energy harvesting IoT is still an open area of research. It is found that fuzzy based energy harvesting IoTs has shown significant improvement over the existing protocols. However, the fuzzy logic suffers from the data uncertainty issue. Therefore, in this paper, Gaussian functional shapes-based type-II fuzzy membership function is used to elect the cluster heads among the IoT devices to reduce the energy consumption of energy harvest IoTs. Thereafter, inter-cluster data aggregation is used. Finally, the communication between the elected cluster heads and the cloud servers or sink. Extensive experiments are drawn by considering the existing and the proposed protocols for energy harvesting IoTs. Comparative analysis reveals that the proposed type-II fuzzy membership function-based protocol outperforms the existing protocols in terms of bandwidth analysis, throughput, conserve energy, network lifetime, and average consumed energy.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types 不同类型数据包传输中控制信道带宽对电信网络质量影响的评估方法
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.5034
Mohialdeen Mustafa Mohammed, Zaika Viktor, Khlaponin Yurii, Berkman Lyubov, Polonskyi Konstiantyn, O. Turovsky
{"title":"Methods for assessing the impact of bandwidth of control channels on the quality of telecommunications networks in the transmission of data packets of different types","authors":"Mohialdeen Mustafa Mohammed, Zaika Viktor, Khlaponin Yurii, Berkman Lyubov, Polonskyi Konstiantyn, O. Turovsky","doi":"10.54039/IJCNIS.V13I2.5034","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.5034","url":null,"abstract":"Abstract: It is known that since the early 2000s there has been a rapid increase in data traffic and a significant increase in the need for information flows in the process of providing new types of telecommunications services. This has led to the fact that the existing telecommunications networks have failed or approached the limit of their ability to serve subscribers with specified quality of service. The problem of improving the network architecture of such networks and improving the quality of their operation based on the use of modern methods and principles has arisen and needs constant solution. In this paper the requirements to the bandwidth of the channels of the telecommunication network management system in modern conditions are analyzed and their formalized description is given. In order to assess the bandwidth of the channel of the control network of the telecommunications network on the indicators of the quality of its work in the transmission of various types of data in the work developed and submitted an appropriate methodology. The method is based on mathematical dependences that describe the process of functioning of the telecommunication network management system based on the application of the laws and rules of queuing theory.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121743891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area NB-IOT城域部署模式实验性能评估
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.4969
K. Turzhanova, V. Tikhvinskiy, S. Konshin, A. Solochshenko
{"title":"Experimental Performance Evaluation of NB-IOT Deployment Modes in Urban Area","authors":"K. Turzhanova, V. Tikhvinskiy, S. Konshin, A. Solochshenko","doi":"10.54039/IJCNIS.V13I2.4969","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.4969","url":null,"abstract":"Narrow-band Internet of Things is a new promising radio technology standard that addresses the requirements of the IoT. The technology provides improved indoor coverage, support of massive number of low data rate devices, low delay sensitivity, ultra-low device cost, low device power consumption and optimized network architecture. The technology can be deployed in three different operational modes: (1) in-band, (2) guard-band, or (3) standalone in dedicated spectrum. The choice of NB-IoT deployment scenario has a significant impact on the quality and performance of the network.In this article, presented the results of an experimental study of the performance of all three scenarios for NB-IoT deploying in a real working cellular network under equal operating conditions for consideration. The following parameters chosen as an assessment measure: radio coverage, network capacity and user experience. The research shown that exact the standalone mode provide the best performance for these parameters. In addition, we have confirmed that all three NB-IoT scenarios coexist perfectly on 2G/4G networks and satisfy the original requirements of 3GPP's in deep coverage and robust quality of network service.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131896349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Z-Transform Based Encryption Algorithm 基于z变换的加密算法研究
Int. J. Commun. Networks Inf. Secur. Pub Date : 2021-08-26 DOI: 10.54039/IJCNIS.V13I2.5052
M. Alenezi, Fawaz S. Al-Anzi
{"title":"A Study of Z-Transform Based Encryption Algorithm","authors":"M. Alenezi, Fawaz S. Al-Anzi","doi":"10.54039/IJCNIS.V13I2.5052","DOIUrl":"https://doi.org/10.54039/IJCNIS.V13I2.5052","url":null,"abstract":"It has become increasingly important to ensure the protection of information, especially data in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard the protection of information against security attacks. It is equally important to design high-performance solutions with affordable cost of implementation. Encryption algorithms are used to transform plain text to the ciphertext in order to protect privacy, prevent data fraud, and prevent unauthorized access of data in daily transactions. There are multiple types of encryption algorithms, each with its niche tactics to enhance security. For instance, different kinds of algorithms include but are not limited to the following: Blowfish, RSA, AES, DES, Triple DES. This paper contributes an efficient and secure encryption algorithm technique for information security based on Z transformation and XOR function known as the Z Transformation Encryption (ZTE) technique. To elaborate, this technique implements concepts of Z transformation and XOR operations at the source. The reverse process is applied at the receiving end of the transaction wherein the inverse of Z transformation and XOR is applied to reveal the original plain text message. The simulation of the proposed algorithm is conducted using the R language. The results show a promising performance comparing to other symmetric algorithms.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127497670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信