Arnob Paul, H. Islam, Shohrab Hossain, Husnu S. Narman
{"title":"A Novel Zone-Walking Protection for Secure DNS Server","authors":"Arnob Paul, H. Islam, Shohrab Hossain, Husnu S. Narman","doi":"10.4018/ijitn.312235","DOIUrl":"https://doi.org/10.4018/ijitn.312235","url":null,"abstract":"A zone walking attack is to get all existing domain information from a secured DNS server. NSEC3 protocol was proposed to defend against zone walking attacks in a secured DNS server, although NSEC3 uses more CPU time. In this paper, the authors have proposed two novel solutions to defend against the zone walking attack by addressing the efficiency issue of secure DNS protocol. They have simulated the proposed solution and analyzed it with different scenarios of the secure DNS server and attackers. The result of the experiment shows that the proposed solution Low Profiling can be effective against zone walking attacks for up to certain server-side and client-side parameters. The work can help researchers to understand how a new approach in the DNSSEC server can defend against zone walking attacks.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46127088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamer R. Omar, A. Amamra, T. Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka
{"title":"Performance Evaluation of Machine-Learning Models for Self-Healing in 5G Networks","authors":"Tamer R. Omar, A. Amamra, T. Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka","doi":"10.4018/ijitn.309701","DOIUrl":"https://doi.org/10.4018/ijitn.309701","url":null,"abstract":"The 5G self-organizing network is a viable solution to the problem of increasing user-connectivity, data rates, and network complexity. This paper proposes a SON solution that uses machine learning for anomaly detection in order to meet user demands. Three different supervised ML algorithms are used for anomaly detection to see which provides the most efficient and accurate results. The various algorithms used key performance indicators (KPIs) to determine whether a base station is healthy, congested, or failing. In order to achieve unbiased results, large datasets composed of multiple simulated network scenarios were preprocessed and partitioned for training and testing. The results show that state vector machine algorithm can accurately detect the status of a base station at exponentially lower processing times than the other ML algorithms. This algorithm was most efficient when larger datasets were used to create the model.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz
{"title":"A Review of COVID-19 Mobile Contact Tracing Applications and Their Impact on Privacy","authors":"Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz","doi":"10.4018/ijitn.309696","DOIUrl":"https://doi.org/10.4018/ijitn.309696","url":null,"abstract":"Contact tracing is a well-established process that has been utilized for years to assist in the effort to control the spread of contagious diseases. The rapid onset and spread of COVID-19 brought about the need for digital solutions which would help to speed up the collection and analysis of relevant health information. With the proliferation of mobile devices, the development of mobile device-based digital contact tracing applications appeared to be the solution. As countries around the globe created digital contact tracing applications for use by their respective populations, a variety of factors allowed for success for some and resulted in failure for others. This review highlights example countries with respect to their unique COVID-19 digital contact tracing solutions, the success or failure of the applications employed on mobile platforms, and the factors which have contributed to the success or failure of these solutions. Additionally, a review of research around data privacy and security in digital contact tracing apps is included.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41421788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Analysis Ads Through the Mini-Programs","authors":"Biao Liu, Lin jie Liu, Jianyi Zhang","doi":"10.4018/ijitn.309700","DOIUrl":"https://doi.org/10.4018/ijitn.309700","url":null,"abstract":"Due to the widespread application and rapid delivery of advertisements for mini-programs, mini-program users are increasingly being harassed by advertisements. However, due to the existence of mini-programs dependent on the corresponding platforms, traditional advertising detection methods cannot detect the advertisements of the mini-programs. In the process of collecting and studying advertising problems, the authors have developed a framework that can run continuously almost without human intervention. They have analyzed 4853 mini-programs in total and got a general understanding of the problems of mini-programs' advertisements. There are several interesting findings, such as frequent pop-up advertisements, redirection, pornographic advertisements, etc. The authors have further detected pornographic advertisements and analyzed the links obtained in mini-programs to identify the malicious nature of the links. Broadly speaking, the framework collects the advertising problems of mini-programs and detects and analyzes some advertisements and malicious links to strengthen the supervision of the platform.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48188843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G Mid-Range Electromagnetic Spectrum Implementation for Critical Infrastructure Development","authors":"U. O. Matthew, J. S. Kazaure, Prisca I. Okochi","doi":"10.4018/ijitn.307103","DOIUrl":"https://doi.org/10.4018/ijitn.307103","url":null,"abstract":"The current research analysed the existing literature on the electromagnetic spectrum influences and made significant contributions in the perspective of the ongoing insinuations of electromagnetic frequency radiation emitted from the novel 5G network technology installations. In this case, the contemporary 5G network technology was tested along ANALOGY1, ANALOGY 2 and ANALOGY3 to find out if 5G network does emit electromagnetic non-ionizing radiation capable of destroying human body cells as already alleged. The paper observed that deploying the standalone 5G network on unmodulated ultra-high frequency beyond 20Gigahertz will produce non-ionizable, non-visible radiation (electrons and protons interacting as fields) capable of adverse health effect including heating up the human skin through polarisation and dipolar moment urtication , thereby destabilising the equilibrium of the human DNA charged particles through the formation of free radicals that are highly reactive due to the presence of unpaired electrons that occurred when water molecules are broken within the human cell.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49086803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Coronavirus Pandemic (COVID-19) and Cooperative-Intelligent Transport Systems","authors":"Bettina Arnegger","doi":"10.4018/ijitn.311827","DOIUrl":"https://doi.org/10.4018/ijitn.311827","url":null,"abstract":"Cooperative-intelligent transport systems (C-ITS) are a solution for the manifold challenges of traffic as well as a major competitive stepping stone for the European automotive and tele-communication industry. However, against the backdrop of far-reaching COVID-19 impacts, the management of such complex C-ITS megaprojects needs to be adapted. Insights from most recent research contributions on megaproject management and the unexpected have shown that fostering a common sense of action, intense and efficient communication, and a strong organizational culture can help C-ITS projects to cope with the unprecedented situation. The institutional role model has proven to be an effective implementation framework for employing such project management methods in the C-ITS context. By combining different strands of research in an analysis of the intersection between recent C-ITS findings and theory on megaproject management and the unexpected, this article contributes to a holistic understanding of the impact of COVID-19 on C-ITS.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44902514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem
{"title":"Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)","authors":"Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem","doi":"10.21608/ijt.2022.266474","DOIUrl":"https://doi.org/10.21608/ijt.2022.266474","url":null,"abstract":": An inverse multiplexing method for irreducible polynomials is presented in this paper based on the theory of substitution boxes. The method is based on the theory of substitution boxes. Following a series of successful experiments, the new approach was put into practice. For reasons of increased complexity and security, the affine conversion period in the Galois field (2^8) has been increased to the maximum value of the period between input and output of 102, the Strict Avalanche Criterion (SAC) has been reduced to nearly half of its original value, and the results are bijective as a result. It was decided to use the number 112 after the Bit Independent Criterion effect had been reduced to produce good results. These breakthroughs are being used to protect information security and to strengthen the advanced encryption standard that is currently in use, according to the researchers. In addition to the addition of a new s-box, their encryption will be more secure and private, making our services even more valuable. Field, Bijective, Balance, SAC.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73749852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Network Anomaly Detection for Optimized Decision Development","authors":"Harshit Srivastava, E. Sheybani, R. Sankar","doi":"10.4018/ijitn.309697","DOIUrl":"https://doi.org/10.4018/ijitn.309697","url":null,"abstract":"The paper presents the development of systems for improved source selection in a process that creates real-time categorization of events using only posts collected through various sensing applications that use social networks (such as Twitter or other mass dissemination networks) for reporting. The system recognizes critical instances in applications and simply views essential information from users (either by explicit user action or by default, as on Twitter) within the event and provides a textual description. As a result, social networks open up unprecedented possibilities for creating sensing applications by representing a set of tweets generated in a limited timeframe as a weighted network for influence concerning users. Obtaining data from a network of social site users substantiates the quality and dependability of data. It collects many users' dynamic behavior to construct and disseminate related information across the channel. The goal is to find a link between various data sources for event abnormalities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency Domain Transformations and CNNs to Predict Unlabeled Shark Behavior With GPS Data","authors":"Geoffrey Daniel Farthing, Hen-Guel Yeh","doi":"10.4018/ijitn.309698","DOIUrl":"https://doi.org/10.4018/ijitn.309698","url":null,"abstract":"This paper provides a comprehensive analysis of frequency domain transformations applied to convolutional neural networks (CNN) to model and predict unlabeled shark behavior in the open ocean with GPS position data. The frequency domain-based CNN networks are compared against the time domain CNN to contrast the two CNN architectures. The shark behavior data were obtained through two datasets where tri-axis accelerometer data were collected from live sharks. The first dataset was from the CSULB Shark Lab and consisted of labeled shark behavior into four shark behavioral categories. The second dataset used in this study was unlabeled and recorded from sharks in the open ocean and had GPS positioning data and depth data points. Findings show that the CNN architecture based on the frequency domain slightly outperforms time-based CNNs for classifying California horn shark behavior. Through spectral density analysis, prominent features are extracted and allow for distinguishing the shark behaviors.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44761106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu
{"title":"Autonomous Flight of High-Endurance UAVs to Monitor Powerlines","authors":"Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu","doi":"10.4018/ijitn.309699","DOIUrl":"https://doi.org/10.4018/ijitn.309699","url":null,"abstract":"In this project, the authors will develop a highly efficient UAV (unmanned aerial vehicle) architecture for long endurance flights. The authors propose an IoT (internet of things) model that will connect a network of drones using a 4G LTE (long-term evolution) connection. The researchers also propose the use of MEC (mobile edge computing) stations, smart GCSs (ground control stations) for battery replacement, and wireless charging via powerline magnetic field harvesting. The authors will be applying these ideas to a powerline monitoring mission profile, creating a large sensor network with computer vision capabilities to detect powerline faults and report them to the proper authorities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45570971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}