International Journal of Computer Networks and Applications最新文献

筛选
英文 中文
Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques 基于智能技术的物联网攻击检测与识别入侵检测系统
International Journal of Computer Networks and Applications Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218517
Trifa S. Othman, Saman M. Abdullah
{"title":"Intrusion Detection Systems for IoT Attack Detection and Identification Using Intelligent Techniques","authors":"Trifa S. Othman, Saman M. Abdullah","doi":"10.22247/ijcna/2023/218517","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218517","url":null,"abstract":"– The Internet of Things (IoT) and its connected objects have resource limitations, which lead to weak security concerns over the IoT infrastructures. Therefore, the IoT networks should always be attached with security solutions. One of the promising security solutions is intrusion detection system (IDS). Machine Learning (ML) algorithms become one of the most significant techniques for building an intelligent IDS based model for attack classification and/or identification. To keep the validation of the ML based IDS, it is essential to train the utilized ML algorithms with a dataset that cover most recent behaviors of IoT based attacks. This work employed an up-to-date dataset known as IoT23, which contains most recent network flows of the IoT objects as benign and other flows as attacks. This work utilized different data preprocessing theories such data cleansing, data coding, and SMOT theory for imbalanced data, and investigating their impact on the accuracy rate. The study's findings show that the intelligent IDS can effectively detect attacks using binary classification and identify attacks using multiclass classification.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45700968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network AFSORP:基于自适应鱼群优化的移动无线传感器网络路由协议
International Journal of Computer Networks and Applications Pub Date : 2023-01-01 DOI: 10.22247/ijcna/2023/218516
D. Jayaraj, J. Ramkumar, M. Lingaraj, B. Sureshkumar
{"title":"AFSORP: Adaptive Fish Swarm Optimization-Based Routing Protocol for Mobility Enabled Wireless Sensor Network","authors":"D. Jayaraj, J. Ramkumar, M. Lingaraj, B. Sureshkumar","doi":"10.22247/ijcna/2023/218516","DOIUrl":"https://doi.org/10.22247/ijcna/2023/218516","url":null,"abstract":"– Advances in information and communication technology and electronics have led to a surge in interest in mobility-enabled wireless sensor networks (MEWSN). These minuscule sensor nodes collect data, process it, and then transmit it via a radio frequency channel to a central station or sink. Most of the time, MEWSNs are placed in hazardous or difficult-to-access locations. To increase the lifespan of a network, available resources must be utilized as efficiently as possible. The whole network connection collapses if even one node loses power, rendering the deployment's goals moot. Therefore, much MEWSN research has focused on energy efficiency, with energy-efficient routing protocols being a key component. This paper proposes an Adaptive Fish Swarm Optimization-based Routing Protocol (AFSORP) for identifying the best route in MEWSN. AFSORP functions based on the natural characteristics of fish. The two most important steps in AFSORP are chasing and blocking, which respectively seek the optimal route and choose the appropriate route to send data from the source node to the destination node. Standard network performance measurements are used to assess AFSORP with the help of the GNS3 simulator. The results show that AFSORP performs better than the existing routing methods.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48340444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy-Preserving Mechanism to Secure IoT-Enabled Smart Healthcare System in the Wireless Body Area Network 在无线身体区域网络中保护物联网智能医疗系统的隐私保护机制
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217707
Renuka S. Pawar, D. Kalbande
{"title":"Privacy-Preserving Mechanism to Secure IoT-Enabled Smart Healthcare System in the Wireless Body Area Network","authors":"Renuka S. Pawar, D. Kalbande","doi":"10.22247/ijcna/2022/217707","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217707","url":null,"abstract":"The IoT has been a subclass of Industry 4.0 standards that is under research from the perspective of quality of service (QoS) & security. Due to the pandemic situations like novel coronavirus smart healthcare monitoring gained growing interest in detection. In IoT data is communicated from Intra WBAN (Wireless Body Area Network) to inter-WBAN and then beyond WBAN. While transferring data from one layer to the other end-to-end data privacy is the challenge to focus on. The privacy-preserving of patients' sensitive data is difficult due to their open nature and resource-constrained sensor nodes. The proposed research design based on routing protocols achieves the patient's sensitive data privacy preservation along with minimum computation efforts and energy consumption. The proposed model is Secure Communication-Elliptic Curve Cryptography (SCECC) WBAN-assisted networks in presence of attackers is evaluated using NS2. The proposed privacy preservation algorithm uses efficient cryptographic solutions using hash, digital signature, and the optimization of the network. © 2022 The Korean Society for Vascular Surgery.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41566488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Aware Cross Layer Based Clustering and Congestion Control Using Mexican Axolotl Algorithm in VANET VANET中基于能量感知跨层聚类和墨西哥Axolotl算法的拥塞控制
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217703
Rashmi K H, Rekha Patil
{"title":"Energy Aware Cross Layer Based Clustering and Congestion Control Using Mexican Axolotl Algorithm in VANET","authors":"Rashmi K H, Rekha Patil","doi":"10.22247/ijcna/2022/217703","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217703","url":null,"abstract":"– In recent years, wireless communication networks have been developing rapidly, which causes many challenges to be faced in vehicular ad hoc networks (VANETs). Congestion is a degradation of the quality of service in which messages begin to be delivered less often to the recipient. So, in this paper, to optimize the energy efficiency of network cross layer based clustering protocol is presented. For clustering, Reputation based Weighted Clustering Protocol (RBWCP) is presented. To enhance the clustering performance of RBWCP, clustering parameters of the protocol are optimally chosen using Mexican Axolotl Algorithm (MAA). In this work, cluster head is selected in every cluster using the weight vehicle’s reputation such as speed, direction and position. After the formation of cluster, mean value of vehicle density (MVVD) threshold is estimated depend on the received signal strength of the vehicles. This threshold value is compared with the density of each vehicle inside the cluster. If the density of the vehicle is greater than the threshold, then the cluster is divided into sub-clusters. It leads to control the congestion in the network. The execution of the proposed model is calculated in terms of cluster lifetime, delivery ratio, delay, overhead and throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45147929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture 使用软件定义网络(SDN)启用架构保护物联网环境的可扩展和稳健的入侵检测系统
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217701
T. M. Alshammari, Faeiz Alserhani
{"title":"Scalable and Robust Intrusion Detection System to Secure the IoT Environments using Software Defined Networks (SDN) Enabled Architecture","authors":"T. M. Alshammari, Faeiz Alserhani","doi":"10.22247/ijcna/2022/217701","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217701","url":null,"abstract":"– Due to the rapid development of smart devices with reduced costs and advanced sensing capabilities, the adoption of the internet of things has recently gained a lot of traction. However, such IoT devices are more vulnerable to being attacked or compromised. Moreover, traditional security mechanisms based on signatures and rules are no longer capable of detecting sophisticated intrusions. In the IoT context, the deployment of intelligent techniques in the control plane of the system architecture plays a vital role in identifying various attacks, including unknown ones. In this study, a software defined network (SDN)-based IoT anomaly intrusion detection system is proposed to detect abnormal behaviors and attacks. Five different machine learning techniques are investigated, including support vector machines, k-nearest neighbor, logistic regression, random forest, and decision trees. A scalable and robust intrusion detection system is designed based on machine learning models and placed at the SDN controller to observe and classify the behavior of IoT devices. A benchmark dataset, ToN-IoT, has been selected to test and evaluate the ML models by conducting several experiments. The obtained results have demonstrated that ML-based IDS can provide a reliable security system. Particularly, the random forest technique outperformed the other studied ML algorithms.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48010084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Management Techniques and their Challenges in Cloud Computing: A Review 云计算中的信任管理技术及其挑战综述
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217708
Pooja Goyal, Sukhvinder Singh Deora
{"title":"Trust Management Techniques and their Challenges in Cloud Computing: A Review","authors":"Pooja Goyal, Sukhvinder Singh Deora","doi":"10.22247/ijcna/2022/217708","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217708","url":null,"abstract":"– Cloud computing is a way to handle tasks like development, production, and maintenance done on the web. This domain is evolving. It uses a pay-per-use system like an electric bill and can be used to run virtual machines. Customers are rapidly adopting and shifting the companies that provide such services due to the presence of numerous service providers. It is also customizable as per users’ requirements but poses several security risks. It is dynamic and can be updated to meet the needs of both the client and the service provider. It is a significant feature of such distributed computing platforms. However, this undermines trust and credibility and generates security, protection, individuality, and authenticity problems. Consequently, selecting an appropriate service provider is the most critical test in the cloud environment. The Trust system is an essential part of how QoS and feedback ratings are judged to evaluate the service. Even so, the executive's plan for observing and evaluating QoS still needs to get past several tests. This paper examines the current impediments to trust in the existing trust framework. This report includes a systematic review of various high-quality articles published on trust management between 2010 and July 2022. To do this, some strategies for managing trust are put into four groups: SLA, suggestion, feedback, and prediction. This article also compares the pros and cons, evaluation methods, tools, and simulation settings of different management models.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45229081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET MANET中混合Cat与基于PSO的深度学习算法检测黑洞和灰洞攻击
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217705
S. Venkatasubramanian, A. Suhasini, S. Hariprasath
{"title":"Detection of Black and Grey Hole Attacks Using Hybrid Cat with PSO-Based Deep Learning Algorithm in MANET","authors":"S. Venkatasubramanian, A. Suhasini, S. Hariprasath","doi":"10.22247/ijcna/2022/217705","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217705","url":null,"abstract":"– The newest example of wireless networks, known as mobile ad hoc networks (MANETs), offers some qualities, including a topology that can change dynamically, a baseless network, a range of transmission, a routing procedure, and reliability. In a black hole attack on a computer network, packets are deleted as opposed to being forwarded through a router. This often happens when a router has been corrupted by several circumstances. A routing attack called a \"black hole\" has the power to bring down an entire network. One of the most common types of assaults on MANETs is the Grey Hole Attack, in which a hostile node allows routing but prevents data transmission. MANET security is a top priority because they are far more susceptible to assaults than wired infrastructure. This study focused on detecting black and grey-hole attacks in MANET by using deep learning techniques. The forwarding ratio metric is used in the individual attack detection phase to distinguish between the defective and normal nodes. The encounter records are manipulated by malicious nodes in the collusion attack detection phase for escaping the detection process. The attacks are detected by using different deep learning techniques like Convolutional Neural Network (CNN) and a Long Short-Term Memory (LSTM) network. The parameter tuning operation is carried out by using the Hybrid Cat-Particle Swarm Optimization (HCPSO). The simulation results shown in our proposed system detect with better accuracy.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49581978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks 基于无线传感器网络的边境监控系统聚类算法及体系结构研究
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217710
Jayachandran J, Vimala Devi K
{"title":"A Survey on Clustering Algorithms and Proposed Architectural Framework for Border Surveillance System in Wireless Sensor Networks","authors":"Jayachandran J, Vimala Devi K","doi":"10.22247/ijcna/2022/217710","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217710","url":null,"abstract":"– Border Surveillance system is a major security issue in all nations. In border surveillance systems, wireless sensor networks are one of the most important technologies which are going to play a vital role in future research. Researchers address the variety of challenges and spread the deployment in large areas in real time. In this paper, an overview of the border surveillance system their applied technologies, and the challenges faced during the deployment are discussed. An architectural framework for the border surveillance system is developed and presented. A comprehensive review is conducted with different routing protocols based on the node’s mobility, node’s localization, routing metrics, delay, throughput, energy efficiency, and their network lifetime. Simulation results of various protocols are conducted and presented. This work is intended to identify and focus on recent protocol developments and also opens research issues that need to be investigated in the future.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49168232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network 用于车载自组织网络安全应用的可靠且可扩展的广播方案
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217709
M. Vala, V. Vora
{"title":"Reliable and Scalable Broadcast Scheme for Safety Applications in Vehicular Ad Hoc Network","authors":"M. Vala, V. Vora","doi":"10.22247/ijcna/2022/217709","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217709","url":null,"abstract":"– In vehicular ad hoc networks (VANETs), safety-related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message broadcasts are key challenges amid high mobility, rapidly changing topologies, and shorter communication ranges. The broadcasting protocol needs to be scalable for large variations in vehicle densities and road topologies. This paper presents a new broadcast protocol for safety applications in vehicular networks. The discussed scheme is adaptive to current network loads and channel conditions. Compared with other state-of-the-art protocols in its category, it offers better robustness, coverage, and scalability. It achieves these gains by selecting the next relay node adaptively and effectively suppressing redundant transmission of safety messages. Compared to existing work, the presented protocol offers performance improvements in terms of coverage and delay. It offers a 21% improvement in delay compared to the farthest distance-based protocol.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45025722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network 移动自组网中基于信任的安全方案的胜任智能建模
International Journal of Computer Networks and Applications Pub Date : 2022-12-30 DOI: 10.22247/ijcna/2022/217706
K. Vijay Anand, G. Abel Thangaraja
{"title":"A Competent Intelligence Modeling for Trust-Based Security Scheme in Mobile Ad Hoc Network","authors":"K. Vijay Anand, G. Abel Thangaraja","doi":"10.22247/ijcna/2022/217706","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217706","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43113289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信