{"title":"Minimalistic Error via Clibat Algorithm for Attack-Defence Model on Wireless Sensor Networks (WSN)","authors":"K. Abdul Basith, T. Shankar","doi":"10.22247/ijcna/2022/217700","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217700","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43563715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm","authors":"V. Maruthi Prasad, B. Bharathi","doi":"10.22247/ijcna/2022/217704","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217704","url":null,"abstract":"","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45024389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Agent-Based Multipath Routing Protocol to Extend Lifetime and Enhancing Reliability of Clustered Wireless Sensor Networks","authors":"Binaya Kumar Patra, Sarojananda Mishra, Sanjay Kumar Patra","doi":"10.22247/ijcna/2022/217702","DOIUrl":"https://doi.org/10.22247/ijcna/2022/217702","url":null,"abstract":"– Over the clustered wireless network systems, development in wireless technology has had a more substantial influence. Entities need to communicate with one another in order to create a sustainable ecosystem. Clustering methods help connect and organise the sensor nodes by load balancing and extending the network lifetime. Only now, various techniques have been developed for solving routing problems but have yet to focus on routing reliability with avoidance of data collision in real scenarios. This research is carried out for the reliability of routing by multi-objective optimization in static and dynamic environments through agent-based analysis with avoidance of data collision and depletion of energy. This study introduces a fuzzy-based multipath clustering technique that exhibits both static and dynamic clustering formation properties. The designated region starts the clustering process once the sensor nodes are ready to begin the data transmission procedure. The proposed technique works in two steps: a) fuzzy cluster head selection; and b) multi-objective agent-based multipath routing protocols for shortest route path discovery. The enhancement made in cluster creation and selection is the critical feature. A well-organized sensor ecosystem has lessened the negative impacts of network collision and energy exhaustion. The packet delivery ratio, communication overhead, and energy consumption are the performance metrics examined when simulating the specified protocol using the computer language NS2. The devised fuzzy-based multi-path routing (FC-MRP) clustering technique outperforms the AODV (Ad-hoc on-demand distance vector routing) protocol, according to the results. The average percentage of improvement concerning PDR, Throughput, end-to-end latency, Overhead, Energy utilised, Energy efficiency, Network lifetime, and PLR is found to be +2.53, +2.23, -18.58, -22.46, -17.95, +23.00, +4.11, -18.09 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45652730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hypervisor Attack Detection Using Advanced Encryption Standard (HADAES) Algorithm on Cloud Data","authors":"R. Mangalagowri, R. Venkataraman","doi":"10.22247/ijcna/2022/215916","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215916","url":null,"abstract":"– Cloud computing demonstrates excellent power to yield cost-efficient, easily manageable, flexible, and charged resources whenever required, over the Internet. Cloud computing, can make the potential of the hardware resources to increase huge through best and shared usage. The growth of the cloud computing concept has also resulted in security challenges, considering that there are resource sharing, and it is moderated with the help of a Hypervisor which can be the target of malicious guest Virtual Machines (VM) and remote intruders. The hypervisor itself is attacked by hackers. Since the hypervisor is attacked, the VMs under the hypervisor is also attacked by the attackers. Hence, to prevent the problems stated above, in this study, Enhanced Particle Swarm Optimization (EPSO) with Hypervisor Attack Detection using Advanced Encryption Standard (HADAES) algorithm is introduced with the intent of improving the cloud performance on the whole. This work contains important phases such as system model, optimal resource allocation, and hypervisor attack detection. The system model contains the data center model, migration request model, and energy model over the cloud computing environment. Resource allocation is done by using the EPSO algorithm which is used to select the optimal resources using local and global best values. Hypervisor attack detection is done by using HADAES algorithm. It is helpful to determine the hypervisor and VM attackers also it is focused to provide higher security for cloud data. From the test result, it is concluded that the proposed algorithm yields superior performance concerning improved reliability, throughput, and reduced energy consumption, cost complexity, and time complexity than the existing methods. The effectiveness of IDS depends on its capacity to strike a balance between the number of defenses and the number of false positives or detecting errors. algorithm. The best and the mean costs of the population members and the execution time when applying the EPSO method. In this study, an innovative time-adaptive PSO is proposed based on the movement patterns named the movement pattern adaptation PSO (EPSO).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47496294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deft Particle Swarm Optimization-Based Routing Protocol (DPSORP) for Energy Consumption Minimization in Mobile Ad-Hoc Network","authors":"S. Preema, M. Thilagu","doi":"10.22247/ijcna/2022/215922","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215922","url":null,"abstract":"– Rapid technological development in the wireless communication sector has improved mobile ad hoc networks (MANETs) to serve a variety of domains, such as military activities, emergency operations, civilian settings, and disaster management. Self-organizing mobile nodes in MANET work together to create a dynamic network architecture to make connections. Before reaching its destination node in a MANET, data must pass through several intermediate nodes. For the creation and maintenance of routes, local link connection is crucial. This paper proposes the Deft Particle Swarm Optimization-based Routing Protocol (DPSORP) to reduce delay, which minimizes energy consumption. DPSORP gives precedence for local and global optimal routes. Before using a route for data transmission, DPSORP assesses its quality using two distinct kinds of rules. DPSORP uses a multi-path for data transmission rather than relying on a single path. Using the NS3 simulator and common network performance metrics and parameters, DPSORP is evaluated. The findings demonstrate unequivocally that the proposed routing protocol, DPSORP, outperforms existing routing protocols in terms of reducing delay and energy consumption .","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43560344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trust-Based Design for Secure and Quality of Service Routing in Mobile Ad Hoc Networks","authors":"G. Sripriya, T. Santha","doi":"10.22247/ijcna/2022/215913","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215913","url":null,"abstract":"– The Mobile Ad Hoc Network (MANET), with its high dynamics, vulnerable links, and total decentralization, poses significant security issues. The MAODV (Multicast Ad-hoc On-Demand Distance Vector) protocol, a crucial routing protocol used in ad-hoc networks, falls short of security standards and is susceptible to assaults brought on by the hostile environment. The harmful nodal points can readily damage Mobile Ad-Hoc Networks (MANETs), which are made up of numerous wireless networks. The hardest task will be sharing bandwidth between wireless nodes while maintaining Quality of Service (QoS) for routing. To identify the potentially harmful nodes, trust-based routing strategies must be developed. The proposed effort entails constructing trust-based QoS routing with a secure mix of social and QoS trust. The suggested design's first method begins with the eradication of dead nodes, which leads to a packet collecting error. These dead nodes may also cause difficulty in the route analysis when employing trust mechanisms for communication. The suggested approach will perform better in terms of forwarding node selection based on packet behavioral characteristics. The forward node will be chosen depending on several parameters, including the residual energy between nodal locations, channel quality between nodes, and connection quality. The proposed method is simulated using the Network Simulator tool (NS2), and the simulation results show that the proposed approach is accurate and efficient in identifying and detaching problematic nodes at regular intervals.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44729969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara
{"title":"Survey and testing of the IoT Cybersecurity Framework Using Intrusion Detection Systems","authors":"Carmen Beatriz Espinosa Garrido, Sandra Sendra Compte, Luis Rosales Roldan, Alejandra Aldrette Malacara","doi":"10.22247/ijcna/2022/215920","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215920","url":null,"abstract":"– The Internet of Things is a new paradigm that facilitates collecting business or personal data through smart devices with Internet connections. IoT devices are heterogeneous and have a limited computational capacity which represents a challenge for protecting data against cyber-attacks. This article surveys communication protocols, cybersecurity attacks and intrusion detection systems (IDSs). This study identifies the IoT protocols used for data transmission, and cybersecurity challenges and then presents a comparative analysis of IDSs. Next, the IoT cybersecurity framework, IoTCyFra, is surveyed by cybersecurity specialists. IoTCyFra is a validated IoT cybersecurity framework with an organizational structure that safeguards data and detects cybersecurity threats in an IoT infrastructure. It also explores how an IDS protects against cyberattacks through an IoT-controlled environment. Finally, the results and conclusions are reported.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46543574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QSIH: Design of a Novel QoS-Aware Sidechain- Based IoT Network Design for Secure Healthcare Deployments","authors":"Pooja Mishra, Sandeep Malik","doi":"10.22247/ijcna/2022/215921","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215921","url":null,"abstract":"– Internet of Medical Things (IoMT) are networks which are targeted towards design of healthcare communication interfaces with low latency and high security. In order to design such interfaces, efficient models for data encryption, hashing, privacy, and quality of service (QoS) awareness are needed. A wide variety of standard medical interfaces are proposed by researchers, which assist in reducing network redundancies for high-throughput and low latency communications. These interfaces also implement security models that ensure data encryption & privacy. But due to incorporation of encryption methods, QoS performance of the IoMT devices reduces, which limits their real-time usability for in-patient monitoring & treatment. In order to improve IoMT QoS while maintaining high security, this text proposes design of QSIH, which is a QoS-aware sidechain model that can be used for securing IoMT networks. The proposed model describes design of a blockchain-based data storage & communication interface, which is capable of removing a wide variety of network attacks. The delay needed for communication in any blockchain-based interface increases exponentially w.r.t. number of blocks added to the system. In order to reduce this delay, a novel machine learning model based on Genetic Algorithm optimization is proposed. The proposed model splits the main blockchain into multiple shards in a QoS-aware manner, thereby ensuring low delay, and high communication throughput. The shards (or sidechains) are managed using an interactive Q-Learning (IQL), which is able to expand or contract these chains depending upon network’s QoS performance. Sidechains which are unused for large periods of time are combined together, and archived for future reference. The archived sidechains are formed from main blockchain, and are merged with other sidechains depending upon archival requirements of the network. Due to such a dynamic side chaining model, the proposed QSIH model is capable of reducing network communication delay by 18%, increase throughput by 14%, reduce storage cost by 5%, while maintaining high level of security & privacy in the network. The model was tested under different IoMT scenarios, and it was observed that it showcased consistent performance across different network emulations.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48831772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
{"title":"Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT)","authors":"R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran","doi":"10.22247/ijcna/2022/215918","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215918","url":null,"abstract":"– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41580410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency","authors":"K. Giridhar, C. Anbuananth, N. Krishnaraj","doi":"10.22247/ijcna/2022/215915","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215915","url":null,"abstract":"– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48580871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}