{"title":"Overload Detection and Energy Conserving Routing Protocol for Underwater Acoustic Communication","authors":"Manel Baba Ahmed","doi":"10.4018/ijwnbt.304386","DOIUrl":"https://doi.org/10.4018/ijwnbt.304386","url":null,"abstract":"The Underwater Wireless Acoustic Sensors are facing several challenges due to their limited energy power that can significantly affect their network performances, hence the design of an efficient and reliable routing protocol for the underwater sensor communication is becoming the main purpose for the researchers, however, in this article, a new mechanism is proposed to balance the underwater network energy consumption due to the frequent data packet forwarding, whereas the protocol uses a method that is based on the historical nodes energy, where sensor that are excessively consuming energy are considered as overloaded node and has to be excluded from the forwarding process depending on their priority value. The implementation and simulation have been performed using NS-2 network simulator, based on the well-known protocol for the underwater acoustic communication ‘Vector-Based Forwarding routing protocol’, the results shows the performance of the proposed mechanism over the VBF in term of energy consumption and efficiency, successful delivery data, and end to end delay.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133707481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Interference Analysis for Home IoT Security Vulnerability Detection","authors":"Alexander McDaid, Eoghan Furey, K. Curran","doi":"10.4018/ijwnbt.2021070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2021070104","url":null,"abstract":"The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and stores data. New wireless attacks such as KeySniffer and other attacks of this type cannot be tracked by traditional solutions. Therefore, this study investigates if wireless spectrum frequency monitoring using interference analysis tools can aid in the monitoring of device signals within a home IoT network. This could be used enhance the security compliance guidelines set forth by OWASP and NIST for these network types and the devices associated. Active and passive network scanning tools are used to provide analysis of device vulnerability and as comparison for device discovery purposes. The work shows the advantages and disadvantages of this signal pattern testing technique compared to traditional network scanning methods. The authors demonstrate how RF spectrum analysis is an effective way of monitoring network traffic over the air waves but also possesses limitations in that knowledge is needed to decipher these patterns. This article demonstrates alternative methods of interference analysis detection.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"75 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Virtual Private Network Traffic Using Machine Learning","authors":"Shane Miller, K. Curran, T. Lunney","doi":"10.4018/ijwnbt.2020070104","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070104","url":null,"abstract":"The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the presented models are capable of classifying network traffic in a binary manner as direct (originating directly from a user's own device) or indirect (makes use of identity and location hiding features of VPNs) with high degrees of accuracy. The experiments conducted to classify OpenVPN usage found that the neural network was able to correctly identify the VPN traffic with an overall accuracy of 93.71%. The further work done to classify Stunnel OpenVPN usage found that the Neural Network was able to correctly identify VPN traffic with an overall accuracy of 97.82% accuracy when using 10-fold cross validation. This final experiment also provided an observation of 3 different validation techniques and the different accuracy results obtained. These results demonstrate a significant advancement in the detection of unauthorised user access with evidence showing that there could be further advances for research in this field particularly in the application of business security where the detection of VPN usage is important to an organization.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131557498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Resource-Efficient Approach on User Association in 5G Networks Using Downlink and Uplink Decoupling","authors":"C. Bouras, V. Kokkinos, Evangelos Michos","doi":"10.4018/ijwnbt.2020070103","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070103","url":null,"abstract":"A user-centered network model can significantly optimize connectivity issues between a user and the corresponding base station (BS). This article shall evaluate the user-centric (UC) model targeted for Fifth Generation telecommunication systems and will attempt to optimize communication between users and BSs. The authors suggest a resource-aware mechanism that targets improving coverage through the network decoupling into two separate and independent uplink and downlink networks. The mechanism shall fully respect each user's initially requested throughput demands and aims to solve the network user BS association problem with efficient resource management techniques. Simulations revealed that the mechanism perfectly preserves quality of service (QoS) and offers increased data rates in favor of ultimate user coverage, in both scenarios. Additionally, Frequency Range 2 offers an increased amount of resources, both increased data rates and higher amounts of devices that are covered by the overall network.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Routing Technique to Enhance Energy Efficiency and Maximize Lifetime of the Network in WSNs","authors":"Nezha El Idrissi, A. Najid, H. E. Alami","doi":"10.4018/ijwnbt.2020070105","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070105","url":null,"abstract":"Energy conservation plays a role important in wireless sensor network (WSN) design. The technique of clustering is one of the approaches to save energy of WSNs; several protocols based on the clustering technique are proposed in the context of energy conservation and maximization of network lifetime. This article proposed a new routing technique to maximize the network lifetime and enhance energy efficiency in WSNs, namely optimal selection of cluster head in the grid (OSCH-Gi). This technique divides the network area into a clustered grid. Each clustered grid has a cluster head (CH) it has been chosen based on the residual energy and distance to the base station of each node. Simulation results indicate that the proposed technique is more effective than other clustering algorithms in terms of the network lifetime and energy consumption.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129012807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad Hoc Networks","authors":"N. Meghanathan","doi":"10.4018/ijwnbt.2020070101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070101","url":null,"abstract":"The set of nodes constituting a minimum connected dominating set (MCDS) in a wireless ad hoc network (WANET) could be considered as the minimum number of nodes that are required to forward a broadcast message so that the message reaches all the nodes in the network. With regards to MCDS construction, we notice that smaller the transmission range for the nodes, the larger the size of the MCDS and vice-versa. Hence, from an energy efficiency point of view, it is imperative to determine the minimum transmission range (we assume uniform transmission range for all the nodes) that would be needed to construct a MCDS of a certain threshold size in WANETs. In this pursuit, we propose a binary search algorithm of logarithmic time complexity to determine the minimum uniform transmission range that would be sufficient to obtain a connected network and construct a MCDS whose size is within a threshold.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SORT: A System for Adaptive Transmission of Video Over Delay Tolerant Networks","authors":"A. Thakur","doi":"10.4018/ijwnbt.20200701.oa2","DOIUrl":"https://doi.org/10.4018/ijwnbt.20200701.oa2","url":null,"abstract":"In challenging environments, opportunistic networks can provide limited communication features in a delay tolerant manner. It is extremely difficult to transmit large data like videos in such environments, as delay may be hours and part of the information may be lost. This article proposes a novel system that uses partial information from prior communication to estimate the network congestion and delay. The video is compressed and packetized using scalable video coding (SVC). Extensions to Spray-and-Wait routing protocols are analyzed to ensure better delivery video quality and lower wastage. Through simulation, including real-world traces, performance of the proposed solutions under multiple scenarios is evaluated. Experimental results show that adaptive control reduces overall delay and minimizes wastage while improving the quality of video at the receiver. Adaptive SVC transmissions demonstrate almost three times increase in decoded content, as compared to non-SVC transmission.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129405200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Model for Quality of Service Evaluation of Heterogeneous Networks","authors":"Farnaz Farid, S. Shahrestani, Chun Ruan","doi":"10.4018/ijwnbt.2020070102","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020070102","url":null,"abstract":"The quality of service (QoS) evaluation of heterogeneous networks is an interesting area of research. The traditional QoS evaluation methods usually use a set of network-centric parameters for the performance evaluation of these networks. As a result, using such methods it is not possible to report a comprehensive performance review of networks that would include diverse applications and technologies. To resolve this issue, in this research, a novel approach has been proposed that applies dynamic significance weights and unified metrics of the QoS-related parameters to various applications and technologies present within a heterogeneous network. The result analysis shows that by applying this methodical approach, the performance evaluation of heterogeneous networks can be carried out systematically and efficiently.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aminu Mohammed, Abdulhakeem Abdulazeez, Ahmed Yusuf Tambuwal
{"title":"Enhanced Priority Load-Aware Scheduling Algorithm for Wireless Broadband Networks","authors":"Aminu Mohammed, Abdulhakeem Abdulazeez, Ahmed Yusuf Tambuwal","doi":"10.4018/ijwnbt.20200701.oa1","DOIUrl":"https://doi.org/10.4018/ijwnbt.20200701.oa1","url":null,"abstract":"WiMAX, one of the emerging wireless broadband networks, was designed to support traffic from applications with diverse QoS requirements. In WiMAX, an efficient resource management technique such as scheduling is required for the proper allocation of network resources to these data streams. This article proposes an enhanced priority load-aware scheduling (EPLAS) algorithm to improve the performance of WiMAX networks. The proposed scheme adaptively determines the weight of each queue based on the queue load. It also introduces a packet drop control mechanism that reduces the packet drop rate and increases the average throughput of the network by prioritizing packets with the earliest deadlines within each queue. The performance of EPLAS was evaluated against other benchmark schemes using several simulation experiments. The results revealed that EPLAS performed significantly better than the benchmark algorithms in terms of average delay, average packet drop ratio, and average throughput.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network","authors":"Alban Scribbins, K. Curran","doi":"10.4018/ijwnbt.2020010101","DOIUrl":"https://doi.org/10.4018/ijwnbt.2020010101","url":null,"abstract":"The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.","PeriodicalId":422249,"journal":{"name":"Int. J. Wirel. Networks Broadband Technol.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}