{"title":"Multi-Pair Cable Measurements for 5G Indoor Service Provisioning","authors":"","doi":"10.33969/j-nana.2021.010104","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010104","url":null,"abstract":"This paper considers the 5G new radio (NR) indoor service provisioning scenario where the CPRI link terminates at remote radio unit (RRU) in the building and multi-pair cable, i.e. CAT-5, is used to provide connectivity between distributed antenna unit (DAU) and RRU. The paper focuses on the de-tailed methodology for multi-pair copper channel measurement including measurement equipment specifications, their respective settings, measurement parameters i.e. characteristics impedance, insertion loss (IL), far-end-crosstalk (FEXT) and near-end-crosstalk (NEXT). The measurements include the cables for next-generation multi-pair system, where multi-pair cables, i.e. CAT-5 cables, are used from the RRU to the DAUs in a building. Conventionally, many multi-pair cables share the same duct in a building and interfere with each other, therefore two parallel multi-pair CAT-5 cables of 50m each are considered for the measurement scenario. This setup result in 4 twisted pairs terminate at each DAU and this configuration is termed as next-generation multi-pair MIMO (NGMM). The number of twisted pairs is increased by using the Phantom mode circuit connected to the opposite ends of each CAT-5 cable and the resulting configuration is called next-generation multi-pair super MIMO (NGMSM). The cable parameters have been measured for frequencies up to 1 GHz and 250 MHz for NGMM and NGMSM, respectively. DL data rate of each configuration is examined by applying conventional block diagonalization.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Cloud Computing and Business Intelligence support UAV Technology","authors":"Nader Shahata","doi":"10.33969/j-nana.2022.020303","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020303","url":null,"abstract":"In recent years, the majority of UAVs are implemented using technologies that require a lot of effort, budget and time. This will consume the available resources in an exaggerated manner and will therefore affect the overall performance of the UAV itself. In this paper, we present the use of cloud computing in conjunction with business intelligence for the aim of adding more efficiency to the UAV technology in the high speed era and the use of 5G technology. The recent introduction of the cloud computing is a very good opportunity which can support business intelligence. Through this paper, we will discuss the procedure of mapping cloud computing to the UAVs and the challenges that will be emerged when doing so. Many of these challenges are not limited to the UAVs energy levels, motion, and GPS settings.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Authentication in Satellite Internet","authors":"Jianing Wang, Yuanyu Zhang, Shuangrui Zhao, Ji He, Yulong Shen, Xiaohong Jiang","doi":"10.33969/j-nana.2022.020406","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020406","url":null,"abstract":"Satellite Internet is a promising technology that provides global connectivity and has attracted widespread attention from both industry and academia. However, the open nature of wireless communication links renders Satellite Internet vulnerable to signal spoofing and illegal access attacks. Authentication has been recognized as an effective countermeasure to these attacks. Therefore, this paper presents a comprehensive survey of existing authentication schemes in Satellite Internet for the first time. We categorize existing authentication schemes into two main scenarios, i.e., the Satellite-based Communication (SATCOM) system and the Global Navigation Satellite System (GNSS) scenario. We further divide the literature in the SATCOM scenario into five sub-categories and that in the GNSS scenario into two sub-categories. Finally, we discuss the challenges that existing authentication schemes are facing and will face and further present some future research directions.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"8 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120949731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"k-Anonymous Query Scheme on the Internet of Things: a Zero Trust Architecture","authors":"Kadhim Hayawi, P. Ho, S. Mathew, Limei Peng","doi":"10.33969/j-nana.2021.010302","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010302","url":null,"abstract":"The paper investigates query-anonymity in Internet of things (IoT) formed by a sensor cloud, where the sensor nodes provide services of sensing and are subject to user queries of sensing data. Due to the heterogeneity and multi-carrier natures of the sensor cloud, user privacy could be impaired when the queries have to go through nodes of a third party. Thus, the paper firstly introduces a novel query k-anonymity scheme that countermeasures such a privacy threat. Based on the proposed k-anonymity scheme, the trade-offs between the achieved query-anonymity and various performance measures including, communication-cost, return-on-investment metric, path-length, and location anonymity metrics, are analyzed. By adopting a hybrid approach that takes into account the average and worst-case analysis, our evaluation results show that most of the obtained bounds on various performance anonymity trade-offs can be expressed precisely in terms of the offered level-of-anonymity k and network diameter d.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125939829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Umar, Zhenqiang Wu, Xuening Liao, Jiawang Chen, Bello Ahmad Muhammad
{"title":"Efficient Anonymous Authentication Scheme in Body Area Networks Via Signal Propagation Characterization","authors":"M. Umar, Zhenqiang Wu, Xuening Liao, Jiawang Chen, Bello Ahmad Muhammad","doi":"10.33969/j-nana.2021.010202","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010202","url":null,"abstract":"Owing to its capability to measure the sensitive biological data of patients through embedded sensors and transmit them via open wireless channels to remote medical experts, wireless body area network (WBAN) has been playing an important role in pervasive healthcare systems. However, the open nature of the wireless channels renders the data susceptible to being eavesdropped by an adversary and linked to the identities of the transmitting devices, which can enable the adversary to gain sensitive information and launch targeted physical attacks. Therefore, anonymous authentication and confidentiality of the data in WBAN are vital. In the last few years, numerous anonymous authentication schemes based on cryptographic primitives and physiological features were designed to enhance security in WBAN. However, most of the existing schemes are not computationally efficient or require additional sensing hardware. To address these limitations, we propose an efficient anonymous authentication scheme for WBAN based on signal propagation characteristics. The key idea in the proposed scheme is to utilize the distinct received signal strength (RSS) variation profiles between on-body and off-body communication channels to conceal the identities of communicating devices, thereby ensuring their anonymity during authentication. We perform security and performance analyses of the proposed approach to prove its security strength and computational efficiency, respectively. Moreover, extensive experiments are conducted on human volunteers in indoor and outdoor environments to show the robustness of our approach. The results of the analyses and the experiments show that our scheme can successfully mitigate 88.8% of active attack attempts with less computation overhead.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}