Journal of Networking and Network Applications最新文献

筛选
英文 中文
Multi-Pair Cable Measurements for 5G Indoor Service Provisioning 5G室内业务开通的多对线缆测量
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010104
{"title":"Multi-Pair Cable Measurements for 5G Indoor Service Provisioning","authors":"","doi":"10.33969/j-nana.2021.010104","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010104","url":null,"abstract":"This paper considers the 5G new radio (NR) indoor service provisioning scenario where the CPRI link terminates at remote radio unit (RRU) in the building and multi-pair cable, i.e. CAT-5, is used to provide connectivity between distributed antenna unit (DAU) and RRU. The paper focuses on the de-tailed methodology for multi-pair copper channel measurement including measurement equipment specifications, their respective settings, measurement parameters i.e. characteristics impedance, insertion loss (IL), far-end-crosstalk (FEXT) and near-end-crosstalk (NEXT). The measurements include the cables for next-generation multi-pair system, where multi-pair cables, i.e. CAT-5 cables, are used from the RRU to the DAUs in a building. Conventionally, many multi-pair cables share the same duct in a building and interfere with each other, therefore two parallel multi-pair CAT-5 cables of 50m each are considered for the measurement scenario. This setup result in 4 twisted pairs terminate at each DAU and this configuration is termed as next-generation multi-pair MIMO (NGMM). The number of twisted pairs is increased by using the Phantom mode circuit connected to the opposite ends of each CAT-5 cable and the resulting configuration is called next-generation multi-pair super MIMO (NGMSM). The cable parameters have been measured for frequencies up to 1 GHz and 250 MHz for NGMM and NGMSM, respectively. DL data rate of each configuration is examined by applying conventional block diagonalization.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Cloud Computing and Business Intelligence support UAV Technology 云计算和商业智能如何支持无人机技术
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020303
Nader Shahata
{"title":"How Cloud Computing and Business Intelligence support UAV Technology","authors":"Nader Shahata","doi":"10.33969/j-nana.2022.020303","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020303","url":null,"abstract":"In recent years, the majority of UAVs are implemented using technologies that require a lot of effort, budget and time. This will consume the available resources in an exaggerated manner and will therefore affect the overall performance of the UAV itself. In this paper, we present the use of cloud computing in conjunction with business intelligence for the aim of adding more efficiency to the UAV technology in the high speed era and the use of 5G technology. The recent introduction of the cloud computing is a very good opportunity which can support business intelligence. Through this paper, we will discuss the procedure of mapping cloud computing to the UAVs and the challenges that will be emerged when doing so. Many of these challenges are not limited to the UAVs energy levels, motion, and GPS settings.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Authentication in Satellite Internet 卫星互联网认证研究综述
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020406
Jianing Wang, Yuanyu Zhang, Shuangrui Zhao, Ji He, Yulong Shen, Xiaohong Jiang
{"title":"A Survey on Authentication in Satellite Internet","authors":"Jianing Wang, Yuanyu Zhang, Shuangrui Zhao, Ji He, Yulong Shen, Xiaohong Jiang","doi":"10.33969/j-nana.2022.020406","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020406","url":null,"abstract":"Satellite Internet is a promising technology that provides global connectivity and has attracted widespread attention from both industry and academia. However, the open nature of wireless communication links renders Satellite Internet vulnerable to signal spoofing and illegal access attacks. Authentication has been recognized as an effective countermeasure to these attacks. Therefore, this paper presents a comprehensive survey of existing authentication schemes in Satellite Internet for the first time. We categorize existing authentication schemes into two main scenarios, i.e., the Satellite-based Communication (SATCOM) system and the Global Navigation Satellite System (GNSS) scenario. We further divide the literature in the SATCOM scenario into five sub-categories and that in the GNSS scenario into two sub-categories. Finally, we discuss the challenges that existing authentication schemes are facing and will face and further present some future research directions.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"8 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120949731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
k-Anonymous Query Scheme on the Internet of Things: a Zero Trust Architecture 物联网的k-匿名查询方案:零信任架构
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010302
Kadhim Hayawi, P. Ho, S. Mathew, Limei Peng
{"title":"k-Anonymous Query Scheme on the Internet of Things: a Zero Trust Architecture","authors":"Kadhim Hayawi, P. Ho, S. Mathew, Limei Peng","doi":"10.33969/j-nana.2021.010302","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010302","url":null,"abstract":"The paper investigates query-anonymity in Internet of things (IoT) formed by a sensor cloud, where the sensor nodes provide services of sensing and are subject to user queries of sensing data. Due to the heterogeneity and multi-carrier natures of the sensor cloud, user privacy could be impaired when the queries have to go through nodes of a third party. Thus, the paper firstly introduces a novel query k-anonymity scheme that countermeasures such a privacy threat. Based on the proposed k-anonymity scheme, the trade-offs between the achieved query-anonymity and various performance measures including, communication-cost, return-on-investment metric, path-length, and location anonymity metrics, are analyzed. By adopting a hybrid approach that takes into account the average and worst-case analysis, our evaluation results show that most of the obtained bounds on various performance anonymity trade-offs can be expressed precisely in terms of the offered level-of-anonymity k and network diameter d.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125939829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Anonymous Authentication Scheme in Body Area Networks Via Signal Propagation Characterization 基于信号传播特性的体域网络高效匿名认证方案
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010202
M. Umar, Zhenqiang Wu, Xuening Liao, Jiawang Chen, Bello Ahmad Muhammad
{"title":"Efficient Anonymous Authentication Scheme in Body Area Networks Via Signal Propagation Characterization","authors":"M. Umar, Zhenqiang Wu, Xuening Liao, Jiawang Chen, Bello Ahmad Muhammad","doi":"10.33969/j-nana.2021.010202","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010202","url":null,"abstract":"Owing to its capability to measure the sensitive biological data of patients through embedded sensors and transmit them via open wireless channels to remote medical experts, wireless body area network (WBAN) has been playing an important role in pervasive healthcare systems. However, the open nature of the wireless channels renders the data susceptible to being eavesdropped by an adversary and linked to the identities of the transmitting devices, which can enable the adversary to gain sensitive information and launch targeted physical attacks. Therefore, anonymous authentication and confidentiality of the data in WBAN are vital. In the last few years, numerous anonymous authentication schemes based on cryptographic primitives and physiological features were designed to enhance security in WBAN. However, most of the existing schemes are not computationally efficient or require additional sensing hardware. To address these limitations, we propose an efficient anonymous authentication scheme for WBAN based on signal propagation characteristics. The key idea in the proposed scheme is to utilize the distinct received signal strength (RSS) variation profiles between on-body and off-body communication channels to conceal the identities of communicating devices, thereby ensuring their anonymity during authentication. We perform security and performance analyses of the proposed approach to prove its security strength and computational efficiency, respectively. Moreover, extensive experiments are conducted on human volunteers in indoor and outdoor environments to show the robustness of our approach. The results of the analyses and the experiments show that our scheme can successfully mitigate 88.8% of active attack attempts with less computation overhead.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信