N. Tawalbeh, M. Malkawi, Hanan M. Abusamaha, S. Alnaser
{"title":"Demand Based Cost Optimization of Electric Bills for Household Users","authors":"N. Tawalbeh, M. Malkawi, Hanan M. Abusamaha, S. Alnaser","doi":"10.54039/ijcnis.v13i3.5111","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5111","url":null,"abstract":"Abstract- Internet of Things (IoT) is increasingly becoming the vehicle to automate, optimize and enhance the performance of systems in the energy, environment, and health sectors. In this paper, we use Wi-Fi wrapped sensors to provide online and in realtime the current energy consumptions at a device level, in a manner to allow for automatic control of peak energy consumption at a household, factory level, and eventually at a region level, where a region can be defined as an area supported by a distinct energy source. This allows to decrease the bill by avoiding heavily and controllable loads during high tariff slice and/or peak period per household and to optimize the energy production and distribution in a given region. The proposed model relies on adaptive learning techniques to help adjust the current load, while taking into consideration the actual and real need of the consumer. The experiments used in this study makes use of current and voltage sensors, Arduino platform, and simulation system. The main performance indexes used are the control of a peak consumption level, and the minimum time needed to adjust the distribution of load in the system. The system was able to keep the maximum load at a maximum of 10 kW in less than 10 seconds of response time. The level and response time are controllable parameters.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114154281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ya. A. Kremenetska, Anatoliy Makarenko, A. Bereznyuk, S. Lazebnyi, N. Rudenko, O. Vlasov
{"title":"High-Altitude Configuration of Non-Terrestrial Telecommunication Network using Optical Wireless Technologies","authors":"Ya. A. Kremenetska, Anatoliy Makarenko, A. Bereznyuk, S. Lazebnyi, N. Rudenko, O. Vlasov","doi":"10.54039/ijcnis.v13i3.5263","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5263","url":null,"abstract":"Non-terrestrial communication technologies will become a key component for the development of future 6th generation (6G) networks. Potentials, implementation prospects, problems and solutions for non-terrestrial telecommunications remain open areas for future research. The article discusses the use of millimeter and optical wavelengths in various configurations of multilevel space communications using LEO satellites, stratospheric platforms and unmanned repeaters. The comparison of the capacity of the Shannon channel for various multi-level scenarios of the satellite communication line is carried out. The directions of research are analyzed to ensure the continuity of communication, adaptation to weather conditions, and achieving a throughput of up to 100 Gbit/s.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117225340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Untraceable Authentication Protocol for IEEE802.11s Standard","authors":"R. Abouhogail","doi":"10.54039/ijcnis.v13i3.5090","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5090","url":null,"abstract":"In the current paper, a new handover authentication protocol for IEEE802.11s Wireless mesh networks is presented. The new protocol divides the network into a number of cells, each cell contains a number of access points and based on the concept of ticket authentication, the mesh user takes a new ticket when enters the region of a new cell which decreases the handover latency. Moreover, in the current paper, a new idea for ticket generation is proposed, called Chain Ticket Derivation Function (CTDF), which uses the concept of a chain. Using CTDF in our proposed protocol raises the level of privacy for the users. The security analysis presented in the paper showed more strengths in our proposed scheme. Two formal verification tools, AVISPA and BAN logic are used to test the proposed protocol.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preventing data leakage by securing chat session with randomized session ID","authors":"H. S. Husin","doi":"10.54039/ijcnis.v13i3.5029","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5029","url":null,"abstract":"Messaging applications have become one of the largest and most popular smartphone applications. It includes the capacity for the users to communicate between themselves via text messages, photos and files. It is necessary to safeguard all messages. Privacy is one of the biggest issues which most individuals in the world of instant messaging ignore. Although several instant messaging applications offer varying security for users, the weaknesses and danger of data assault are increasing. Not just business discussions, our data must also be safeguarded during everyday discussions since data is very sensitive for everybody, and data protection is very crucial to prevent undesired loss of information. To address these types of weaknesses and hazards associated with data attacks, we require an encrypted messaging protocol and also hide IP address method for a safe interaction. This paper's goal is to protect conversations from targeted attacker by securing the communication between user and hide IP address from unauthorized access.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127514589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Essraa Hesham Mahmoud, Mohammed S. Gadelrab, Khaled Elsayed, A. Sallam
{"title":"Modelling Multilayer Communication Channel in Terahertz Band for Medical Applications","authors":"Essraa Hesham Mahmoud, Mohammed S. Gadelrab, Khaled Elsayed, A. Sallam","doi":"10.54039/ijcnis.v13i3.5041","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5041","url":null,"abstract":"In this work we present a multi-layer channel model for terahertz communication that incorporates both layers of human body tissues and textile layers. Many research works tackled communication channel modelling in human body alone while some other research focused on textile characterization/modelling alone. There is a real gap in connecting these different models. To investigate this, a multi-layer channel model for terahertz communication is developed, this model assumes external textile layer stacked over layers of human body tissues. The electromagnetic properties of the different layers are extracted from previous works that used time domain spectroscopy (TDS) in the terahertz band to characterize each of the considered layers. The model is implemented as a flexible MATLAB/Octave program that enables the simulation of layers with either fixed or random depths. This paper aims to pave the way to connecting patients’ in-body nano-nodes with off-body (on-cloth) nano-nodes by building such a combined channel model. This helps in many applications especially in the medical field. For example, having connected nano-nodes can help in diagnosing diseases, monitoring health by sending information to the external environment, treatment (e.g., increasing or decreasing a certain dose depending on the monitoring), etc. The obtained results show how the THz signal can be affected when it propagates through heterogeneous mediums (i.e., human body tissues and textile). Various types of path-loss has been calculated for this purpose and verified by comparison with results from previous research on separate models of human body and textile.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129756347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Deep Hiding/Extraction Algorithm to Enhance the Payload Capacity and Security Level of Hidden Information","authors":"Marwa Ahmad, Nameer N. El-Emam, A. F. Al-Azawi","doi":"10.54039/ijcnis.v13i3.4759","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.4759","url":null,"abstract":"Steganography algorithms have become a significant technique for preventing illegal users from obtaining secret data. In this paper, a deep hiding/extraction algorithm has been improved (IDHEA) to hide a secret message in colour images. The proposed algorithm has been applied to enhance the payload capacity and reduce the time complexity. Modified LSB (MLSB) is based on disseminating secret data randomly on a cover-image and has been proposed to replace a number of bits per byte (Nbpb), up to 4 bits, to increase payload capacity and make it difficult to access the hiding data. The number of levels of the IDHEA algorithm has been specified randomly; each level uses a colour image, and from one level to the next, the image size is expanded, where this algorithm starts with a small size of a cover-image and increases the size of the image gradually or suddenly at the next level, according to an enlargement ratio. Lossless image compression based on the run-length encoding algorithm and Gzip has been applied to enable the size of the data that is hiding at the next level, and data encryption using the Advanced Encryption Standard algorithm (AES) has been introduced at each level to enhance the security level. Thus, the effectiveness of the proposed IDHEA algorithm has been measured at the last level, and the performance of the proposed hiding algorithm has been checked by many statistical and visual measures in terms of the embedding capacity and imperceptibility. Comparisons between the proposed approach and previous work have been implemented; it appears that the intended approach is better than the previously modified LSB algorithms, and it works against visual and statistical attacks with excellent performance achieved by using the detection error (PE). Furthermore, the results confirmed that the stego-image with high imperceptibility has reached even a payload capacity that is large and replaces twelve bits per pixel (12-bpp). Moreover, testing is confirmed in that the proposed algorithm can embed secret data efficiently with better visual quality.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132661903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rana Alrawashdeh, Mohammad Al-Fawa'reh, W. Mardini
{"title":"Enhanced Epileptic Seizure diagnosis using EEG Signals with Support vector machine and Bagging Classifiers","authors":"Rana Alrawashdeh, Mohammad Al-Fawa'reh, W. Mardini","doi":"10.54039/ijcnis.v13i3.5114","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5114","url":null,"abstract":"Many approaches have been proposed using Electroencephalogram (EEG) to detect epilepsy seizures in their early stages. Epilepsy seizure is a severe neurological disease. Practitioners continue to rely on manual testing of EEG signals. Artificial intelligence (AI) and Machine Learning (ML) can effectively deal with this problem. ML can be used to classify EEG signals employing feature extraction techniques. This work focuses on automated detection for epilepsy seizures using ML techniques. Various algorithms are investigated, such as Bagging, Decision Tree (DT), Adaboost, Support vector machine (SVM), K-nearest neighbors(KNN), Artificial neural network(ANN), Naïve Bayes, and Random Forest (RF) to distinguish injected signals from normal ones with high accuracy. In this work, 54 Discrete wavelet transforms (DWTs) are used for feature extraction, and the similarity distance is applied to identify the most powerful features. The features are then selected to form the features matrix. The matrix is subsequently used to train ML. The proposed approach is evaluated through different metrics such as F-measure, precision, accuracy, and Recall. The experimental results show that the SVM and Bagging classifiers in some data set combinations, outperforming all other classifiers","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Network Intrusion Detection System Using Complex Deep Neuronal Networks","authors":"M. Al-Shabi","doi":"10.54039/ijcnis.v13i3.5148","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5148","url":null,"abstract":"Recent years have witnessed a tremendous development in various scientific and industrial fields. As a result, different types of networks are widely introduced which are vulnerable to intrusion. In view of the same, numerous studies have been devoted to detecting all types of intrusion and protect the networks from these penetrations. In this paper, a novel network intrusion detection system has been designed to detect cyber-attacks using complex deep neuronal networks. The developed system is trained and tested on the standard dataset KDDCUP99 via pycharm program. Relevant to existing intrusion detection methods with similar deep neuronal networks and traditional machine learning algorithms, the proposed detection system achieves better results in terms of detection accuracy.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123231239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lavanya-Nehan Degambur, A. Mungur, Sheeba Armoogum, S. Pudaruth
{"title":"Resource Allocation in 4G and 5G Networks: A Review","authors":"Lavanya-Nehan Degambur, A. Mungur, Sheeba Armoogum, S. Pudaruth","doi":"10.54039/ijcnis.v13i3.5116","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5116","url":null,"abstract":"The advent of 4G and 5G broadband wireless networks brings several challenges with respect to resource allocation in the networks. In an interconnected network of wireless devices, users, and devices, all compete for scarce resources which further emphasizes the fair and efficient allocation of those resources for the proper functioning of the networks. The purpose of this study is to discover the different factors that are involved in resource allocation in 4G and 5G networks. The methodology used was an empirical study using qualitative techniques by performing literature reviews on the state of art in 4G and 5G networks, analyze their respective architectures and resource allocation mechanisms, discover parameters, criteria and provide recommendations. It was observed that resource allocation is primarily done with radio resource in 4G and 5G networks, owing to their wireless nature, and resource allocation is measured in terms of delay, fairness, packet loss ratio, spectral efficiency, and throughput. Minimal consideration is given to other resources along the end-to-end 4G and 5G network architectures. This paper defines more types of resources, such as electrical energy, processor cycles and memory space, along end-to-end architectures, whose allocation processes need to be emphasized owing to the inclusion of software defined networking and network function virtualization in 5G network architectures. Thus, more criteria, such as electrical energy usage, processor cycle, and memory to evaluate resource allocation have been proposed. Finally, ten recommendations have been made to enhance resource allocation along the whole 5G network architecture.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Turovsky, Vadym Vlasenko, Nataliia Rudenko, O. Golubenko, O. Kitura, Oleksandr Drobyk
{"title":"Two-Time Procedure for Calculation of Carrier Frequency of Phasomodulated in Communication Systems","authors":"O. Turovsky, Vadym Vlasenko, Nataliia Rudenko, O. Golubenko, O. Kitura, Oleksandr Drobyk","doi":"10.54039/ijcnis.v13i3.5165","DOIUrl":"https://doi.org/10.54039/ijcnis.v13i3.5165","url":null,"abstract":"The use in radio communication systems of phase modulation of a signal intended for the transmission of useful information in a continuous mode creates the problem of frequency uncertainty of the received signal by frequency.In practice, it is not possible to implement frequency estimation in the conditions of chat uncertainty of the signal in the channel with low energy of the signal received in the continuous mode. Therefore, the estimation of the carrier frequency offset of the signal received relative to the nominal value is carried out before other synchronization procedures are included, namely: phase synchronization and clock synchronization. The paper generalizes the procedure and forms a two-step procedure for calculating the carrier frequency of the phase-modulated signal of a radio communication system for data transmission in a continuous mode, taking into account the condition of uncertainty of all signal parameters. Achieving the minimum observation interval in the given order of calculation of the carrier frequency is ensured by the use of the fast Fourier transform function. In order to analyze the effectiveness of this procedure, the process of estimating the carrier frequency of the phase-modulated signal of the radio communication system during data transmission in continuous mode and functional dependences of the maximum frequency in the signal spectrum and the minimum variance of carrier frequency estimation. This procedure allows a two-stage assessment of the carrier frequency according to the rule of maximum likelihood, taking into account the condition of uncertainty of all parameters of the signal received by the satellite communication system in a continuous mode with a minimum observation interval. Achieving the minimum observation interval in the given order of carrier frequency estimation is ensured by using the fast Fourier transform function and two estimation steps. The analysis of the efficiency of the estimation of the specified order was carried out on the basis of comparison of a ratio of the received minimum variance of an estimation of a carrier frequency and theoretically possible border of the minimum variance.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124902831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}