International Journal of Computer Networks and Applications最新文献

筛选
英文 中文
Extending the Energy Efficiency of Nodes in an Internet of Things (IoT) System via Robust Clustering Techniques 通过鲁棒聚类技术提高物联网(IoT)系统中节点的能效
International Journal of Computer Networks and Applications Pub Date : 2023-12-30 DOI: 10.22247/ijcna/2023/223685
Abdullah A. Al-Atawi
{"title":"Extending the Energy Efficiency of Nodes in an Internet of Things (IoT) System via Robust Clustering Techniques","authors":"Abdullah A. Al-Atawi","doi":"10.22247/ijcna/2023/223685","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223685","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" 60","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139137468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy-Conserved Stability and Density-Aware QoS-Enabled Topological Change Adaptable Multipath Routing in MANET 城域网中一种能量守恒、稳定且密度感知的 QoS 拓扑变化适应性多路径路由技术
International Journal of Computer Networks and Applications Pub Date : 2023-12-29 DOI: 10.22247/ijcna/2023/223692
Binuja Philomina Marydasan, Ranjith Nadarajan
{"title":"An Energy-Conserved Stability and Density-Aware QoS-Enabled Topological Change Adaptable Multipath Routing in MANET","authors":"Binuja Philomina Marydasan, Ranjith Nadarajan","doi":"10.22247/ijcna/2023/223692","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223692","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"84 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139146678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Power Aware Hybrid Routing Strategy for Large-Scale Wireless Sensor Networks 大规模无线传感器网络的安全功率感知混合路由策略
International Journal of Computer Networks and Applications Pub Date : 2023-12-29 DOI: 10.22247/ijcna/2023/223695
Mohammad Sirajuddin, B. Sateesh Kumar
{"title":"Secure Power Aware Hybrid Routing Strategy for Large-Scale Wireless Sensor Networks","authors":"Mohammad Sirajuddin, B. Sateesh Kumar","doi":"10.22247/ijcna/2023/223695","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223695","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139142410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficacy Artificial Bee Colony Optimization-Based Gaussian AOMDV (EABCO-GAOMDV) Routing Protocol for Seamless Traffic Rerouting in Stochastic Vehicular Ad Hoc Network 基于人工蜂群优化的高斯 AOMDV(EABCO-GAOMDV)路由协议在随机车载 Ad Hoc 网络中实现无缝流量重路由的功效
International Journal of Computer Networks and Applications Pub Date : 2023-12-28 DOI: 10.22247/ijcna/2023/223694
M. Kayalvizhi, S. Geetha
{"title":"Efficacy Artificial Bee Colony Optimization-Based Gaussian AOMDV (EABCO-GAOMDV) Routing Protocol for Seamless Traffic Rerouting in Stochastic Vehicular Ad Hoc Network","authors":"M. Kayalvizhi, S. Geetha","doi":"10.22247/ijcna/2023/223694","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223694","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"61 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139150420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Current Detection and Prevention Techniques for Black Hole Attack in AODV of MANET 城域网 AODV 中黑洞攻击的当前检测和预防技术概览
International Journal of Computer Networks and Applications Pub Date : 2023-12-27 DOI: 10.22247/ijcna/2023/223691
Mohamed A. Ryan, Sayed Nouh, Aly M. El-Semary
{"title":"A Survey of Current Detection and Prevention Techniques for Black Hole Attack in AODV of MANET","authors":"Mohamed A. Ryan, Sayed Nouh, Aly M. El-Semary","doi":"10.22247/ijcna/2023/223691","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223691","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"2 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139153632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Hybrid Metaheuristic Optimization Algorithm for Trust-Aware Privacy Preservation in Cloud Computing 为云计算中具有信任意识的隐私保护设计混合元搜索优化算法
International Journal of Computer Networks and Applications Pub Date : 2023-12-15 DOI: 10.22247/ijcna/2023/223690
Himani Saini, Gopal Singh, Manju Rohil
{"title":"Design of Hybrid Metaheuristic Optimization Algorithm for Trust-Aware Privacy Preservation in Cloud Computing","authors":"Himani Saini, Gopal Singh, Manju Rohil","doi":"10.22247/ijcna/2023/223690","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223690","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"53 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139178207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions 无人机网络安全研究:网络攻击、防御技术与未来研究方向
International Journal of Computer Networks and Applications Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223417
Simon Niyonsaba, Karim Konate, Moussa Moindze Soidridine
{"title":"A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions","authors":"Simon Niyonsaba, Karim Konate, Moussa Moindze Soidridine","doi":"10.22247/ijcna/2023/223417","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223417","url":null,"abstract":"– Today, Unmanned Aerial Vehicles (UAV), also known as drones, are increasingly used by organizations, businesses and governments in a variety of military and civilian applications, including reconnaissance, border surveillance, port security, transportation, public safety surveillance, agriculture, scientific research, rescue and more. However, drone cybersecurity has become a major concern due to the growing risk of cyberattacks aimed at compromising the confidentiality, integrity and availability of drone systems. These cyberattacks can have serious consequences, such as disclosure or theft of sensitive data, loss of drones, disruption of drone performance, etc. In the existing literature, little work has been devoted to the cybersecurity of UAV systems. To fill this gap, a taxonomy of cyberattacks in UAV is proposed focusing on the three main categories, namely interception attacks against confidentiality, modification or fabrication attacks against integrity and disruption attacks against data availability. Next, a survey of defense techniques that can be used to protect UAV systems is carried out. Finally, a discussion is held on technologies for improving drone cybersecurity, such as Blockchain and Machine Learning, as well as the challenges and future direction of research.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Enhancement of Mobility-Enabled Wireless Sensor Network Using Sophisticated Eagle Search Optimization-Based Gaussian Ad Hoc On-Demand Distance Vector (SESO-GAODV) Routing Protocol 基于先进鹰搜索优化的高斯自组织按需距离矢量(SESO-GAODV)路由协议增强移动无线传感器网络性能
International Journal of Computer Networks and Applications Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223428
V. Veerakumaran, Aruchamy Rajini
{"title":"Performance Enhancement of Mobility-Enabled Wireless Sensor Network Using Sophisticated Eagle Search Optimization-Based Gaussian Ad Hoc On-Demand Distance Vector (SESO-GAODV) Routing Protocol","authors":"V. Veerakumaran, Aruchamy Rajini","doi":"10.22247/ijcna/2023/223428","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223428","url":null,"abstract":"– The research focuses on enhancing the performance of Mobility Enabled Wireless Sensor Networks (ME-WSNs) through the introduction of a novel routing protocol named Sophisticated Eagle Search Optimization-Based Gaussian Ad Hoc On-demand Distance Vector (SESO-GAODV). ME-WSNs pose unique challenges due to their dynamic and rapidly changing network topologies. To address these challenges, SESO-GAODV leverages the intelligent optimization techniques of Sophisticated Eagle Search Optimization and the dynamic route discovery capabilities of Gaussian Ad Hoc On-demand Distance Vector (GAODV). The proposed protocol undergoes extensive evaluations and comparisons with other existing routing protocols. Through comprehensive performance analysis, SESO-GAODV demonstrates superior results, including reduced delay, increased throughput, minimized packet loss, and lower energy consumption. The protocol's adaptability to changing network conditions and efficient handling of node mobility contribute to its energy-efficient nature, making it a promising solution for enhancing data transmission efficiency and reliability in ME-WSNs. SESO-GAODV's ability to optimize energy consumption ensures a prolonged network lifetime, facilitating seamless communication and optimized network performance in dynamic and challenging environments.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay Aware Clustered Service Discovery Scheme Based on Trust for Mobile Ad Hoc Networks (MANET) 基于信任的延迟感知移动自组网(MANET)集群服务发现方案
International Journal of Computer Networks and Applications Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223425
Prabu B., G. Jagatheeshkumar
{"title":"Delay Aware Clustered Service Discovery Scheme Based on Trust for Mobile Ad Hoc Networks (MANET)","authors":"Prabu B., G. Jagatheeshkumar","doi":"10.22247/ijcna/2023/223425","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223425","url":null,"abstract":"– Service discovery is one of the most difficult aspects of MANETs. The primary concern is the assignment of the optimal service to the service requester. This work intends to address this issue by proposing a clustered trustworthy service discovery scheme. The Cluster Head (CH) node selection and recycling, 𝑺𝑬𝑹𝑽 𝑨𝑫 , request, response and service ranking are the crucial phases of this work. The CH node is chosen by considering the trust parameters like mobility, energy and number of neighbors. The selected CH node calculates the level of trust for each of its member nodes by employing trust criteria such as energy consumption, packet forwarding ratio, and node behavior. The node responsible for requesting services delivers the 𝑺𝑬𝑹𝑽 𝑹𝒆𝒒 packet to the CH node, which thereafter searches its local memory for the corresponding service. Finally, the matching services are evaluated based on the distance of the service, the level of trust and the workload of the service provider. As significant metrics are considered for recommending service, the service requester is assured with reliable and faster service provisioning, which is proven by the experimental results.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of the K-Means-LSTM Hybrid Model for Optimization of Spectrum Sensing in Cognitive Radio Networks 认知无线电网络频谱感知优化的k -均值- lstm混合模型性能评价
International Journal of Computer Networks and Applications Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223421
Nyashadzashe Tamuka, Khulumani Sibanda
{"title":"Performance Evaluation of the K-Means-LSTM Hybrid Model for Optimization of Spectrum Sensing in Cognitive Radio Networks","authors":"Nyashadzashe Tamuka, Khulumani Sibanda","doi":"10.22247/ijcna/2023/223421","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223421","url":null,"abstract":"– CR (cognitive radio) technology has become an attractive field of research owing to the increased demand for spectrum resources. One of the duties of this technology is spectrum sensing which involves the opportunistic identification of vacant frequency bands for occupation by unlicensed users. Various traditional and state of art Machine-Learning algorithms have been proposed for sensing these vacant frequency bands. However, the common drawbacks of the proposed traditional techniques are degraded performance at low signal-to-noise ratios (SNR) as well as the requirement for prior information about the licensed user signal characteristics. More so, several Machine-Learning / Deep Learning techniques depend on simulated, supervised, and static (batch) spectrum datasets with synthesized features, which is not the case with real-world networks. Hence, this study aims to optimize real-time and dynamic spectrum sensing in wireless networks by establishing and evaluating a K-means-LSTM novice model (artifact) that is robust to low SNR and doesn’t require a supervised spectrum dataset. Firstly, the unsupervised spectrum dataset was collected by an RTL-SDR dongle and labelled by the K-means algorithm in MATLAB. The labelled spectrum dataset was utilized for training the LSTM algorithm. The resultant LSTM model’s performance was evaluated and compared to other commonly used spectrum detection models. Findings revealed that the proposed model established from the K-Means and LSTM algorithms yielded a Pd (detection probability) of 94%, Pfa (false-alarm probability) of 71%, and an accuracy of 97% at low SNR such as -20 dB, a performance which was superior to other models' performance. Using our proposed model, it is possible to optimize real-time spectrum sensing at low SNR without a prior supervised spectrum dataset.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136152368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信