Journal of Computer Networks and Communications最新文献

筛选
英文 中文
Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method 基于最大熵原理的火花法银行客户账户验证
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-12-31 DOI: 10.1155/2023/8840168
Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. K. Deepa, S. Balakumar
{"title":"Maximum Entropy Principle Based on Bank Customer Account Validation Using the Spark Method","authors":"Xiaorong Qiu, Ye Xu, Yingzhong Shi, S. K. Deepa, S. Balakumar","doi":"10.1155/2023/8840168","DOIUrl":"https://doi.org/10.1155/2023/8840168","url":null,"abstract":"Bank customer validation is carried out with the aim of providing a series of services to users of a bank and financial institutions. It is necessary to perform various analytical methods for user’s accounts due to the high volume of banking data. This research works in the field of money laundering detection from real bank data. Banking data analysis is a complex process that involves information gathered from various sources, mainly in terms of personality, such as bills or bank account transactions which have qualitative characteristics such as the testimony of eyewitnesses. Operational or research activities can be greatly improved if supported by proprietary techniques and tools, due to the vast nature of this information. The application of data mining operations with the aim of discovering new knowledge of banking data with an intelligent approach is considered in this research. The approach of this research is to use the spiking neural network (SNN) with a group of sparks to detect money laundering, but due to the weakness in accurately identifying the characteristics of money laundering, the maximum entropy principle (MEP) method is also used. This approach will have a mapping from clustering and feature extraction to classification for accurate detection. Based on the analysis and simulation, it is observed that the proposed approach SNN-MFP has 87% accuracy and is 84.71% more functional than the classical method of using only the SNN. In this analysis, it is observed that in real banking data from Mellat Bank, Iran, in its third and fourth data, with a comprehensive analysis and reaching different outputs, there have been two money laundering cases.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"66 11","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139132505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Application-Level Associations Between IoT Devices Using a Modified Apriori Algorithm 使用改进的Apriori算法检测物联网设备之间的应用级关联
Journal of Computer Networks and Communications Pub Date : 2023-10-17 DOI: 10.37256/cnc.1220233263
Juan Benedicto L. Aceron, Marc Elizette R. Teves, Wilson M. Tan
{"title":"Detecting Application-Level Associations Between IoT Devices Using a Modified Apriori Algorithm","authors":"Juan Benedicto L. Aceron, Marc Elizette R. Teves, Wilson M. Tan","doi":"10.37256/cnc.1220233263","DOIUrl":"https://doi.org/10.37256/cnc.1220233263","url":null,"abstract":"Internet of Things (IoT) for home systems enables new functionalities and results in significant conveniences. However, their reliance on a stable, continuous Internet connectivity reduces their overall reliability. Losing connectivity to the Internet, for many of these devices, translates to the cessation of even the most basic of functionalities (e.g., being able to turn on the light, even from within the house). A possible solution to this problem is to shift some functionalities done by cloud-based servers to the edge (e.g. the home router), but doing so conveniently would necessitate the ability to dynamically identify pairs of IoT devices (usually sensor-actuator pairs) that communicate (their associations), and the rewriting/rerouting of packets or messages between those devices. The first problem is also known as the association detection problem, and is where this paper makes a contribution. We describe a solution to the association detection problem using a modified Apriori algorithm and a method to create its input from network traffic, and then revise the solution to respond to fluctuating network conditions. The final design accurately discovers sensor-actuator pairs using a simple approach with low computational complexity, and with only the hardware addresses of monitored IoT devices as its starting knowledge.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135992826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical Switching Data Center Networks: Understanding Techniques and Challenges 光交换数据中心网络:理解技术和挑战
Journal of Computer Networks and Communications Pub Date : 2023-09-04 DOI: 10.37256/cnc.1220233159
Yisong Zhao, Xuwei Xue, Xiongfei Ren, Wenzhe Li, Yuanzhi Guo, Changsheng Yang, Daohang Dang, Shicheng Zhang, Bingli Guo, Shanguo Huang
{"title":"Optical Switching Data Center Networks: Understanding Techniques and Challenges","authors":"Yisong Zhao, Xuwei Xue, Xiongfei Ren, Wenzhe Li, Yuanzhi Guo, Changsheng Yang, Daohang Dang, Shicheng Zhang, Bingli Guo, Shanguo Huang","doi":"10.37256/cnc.1220233159","DOIUrl":"https://doi.org/10.37256/cnc.1220233159","url":null,"abstract":"Relying on the flexible-access interconnects to the scalable storage and compute resources, data centers deliver critical communications connectivity among numerous servers to support the housed applications and services. To provide the high-speeds and long-distance communications, the data centers have turned to fiber interconnections. With the stringently increased traffic volume, the data centers are then expected to further deploy the optical switches into the systems infrastructure to implement the full optical switching. This paper first summarizes the topologies and traffic characteristics in data centers and analyzes the reasons and importance of moving to optical switching. Recent techniques related to the optical switching, and main challenges limiting the practical deployments of optical switches in data centers are also summarized and reported.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135402473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Identity With Applications to Security and Privacy for the Internet of Things 物联网安全与隐私的去中心化身份应用
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-08-28 DOI: 10.37256/cnc.1220233048
Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, G.C. Polyzos
{"title":"Decentralized Identity With Applications to Security and Privacy for the Internet of Things","authors":"Chalima Dimitra Nassar Kyriakidou, Athanasia Maria Papathanasiou, G.C. Polyzos","doi":"10.37256/cnc.1220233048","DOIUrl":"https://doi.org/10.37256/cnc.1220233048","url":null,"abstract":"Decentralized Identity (dID) has brought to the forefront the advantages and importance of total user control over identity. Previous solutions delegate identity management to the responsibility of third-party applications or services, which may raise multiple privacy and security concerns regarding users' personal data. In this paper, we highlight the significance of dID and in particular Self-Sovereign Identity (SSI) for a rapidly evolving ecosystem with a plethora of interconnected devices with different characteristics, such as the Internet of Things (IoT). Specifically, we analyze the benefits of incorporating SSI principles and technologies in IoT environments, while also discussing the challenges that may be introduced when combining the complexity of SSI concepts with the diverse and large-scale IoT environment. In addition, we present a thorough overview of existing systems that integrate SSI components into IoT environments, in order to address the challenges of authentication, authorization, and access control even for constrained IoT devices. Finally, we provide a comprehensive analysis regarding the contributions of Decentralized Identifiers and Verifiable Credentials, the two main pillars of SSI, for enhanced privacy and security for the Internet at large and for the IoT in particular.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"14 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76246938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Game-Based Resource Allocation Scheme for Heterogeneous Networks with eICIC Technology 基于协作博弈的eICIC异构网络资源分配方案
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-08-28 DOI: 10.1155/2023/5526441
Sungwook Kim
{"title":"Cooperative Game-Based Resource Allocation Scheme for Heterogeneous Networks with eICIC Technology","authors":"Sungwook Kim","doi":"10.1155/2023/5526441","DOIUrl":"https://doi.org/10.1155/2023/5526441","url":null,"abstract":"Heterogeneous network (HetNet) is considered to be the most promising approach for increasing communication capacity. However, HetNet control problems are difficult due to their intertier interference. Recently, the enhanced intercell interference coordination (eICIC) technology is introduced to offer several benefits, including a more equitable traffic load distribution across the macro and embedded small cells. In this paper, we design a new resource allocation scheme for the eICIC-based HetNet. Our proposed scheme is formulated as a joint cooperative game to handle conflicting requirements. By adopting the ideas of Kalai and Smorodinsky solution (KSS), multicriteria Kalai and Smorodinsky solution (MCKSS), and sequential Raiffa solution (SRS), we develop a hybrid control algorithm for an adaptive resource sharing between different base stations. To effectively adjust the eICIC fraction rates, the concepts of MCKSS and SRS are applied in an interactive manner. For mobile devices in the HetNet, the assigned resource is distributed by using the idea of KSS. The key insight of our algorithm is to translate the originally competitive problem into a hierarchical cooperative problem to reach a socially optimal outcome. The main novelty of our approach is its flexibility to reach a reciprocal consensus under dynamic HetNet environments. Exhaustive system simulations illustrate the performance gains along different dimensions, such as system throughput, device payoff, and fairness among devices. The superiority of our proposed scheme is fully demonstrated in comparison with three other existing eICIC control protocols.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41924262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Session Layer Selection in IoT Actuation 物联网驱动中的动态会话层选择
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-07-28 DOI: 10.37256/cnc.1220232874
Rolando Herrero
{"title":"Dynamic Session Layer Selection in IoT Actuation","authors":"Rolando Herrero","doi":"10.37256/cnc.1220232874","DOIUrl":"https://doi.org/10.37256/cnc.1220232874","url":null,"abstract":"While most Internet of Things (IoT) solutions involve sensing, some of them also introduce actuation mechanisms. Specifically, devices interact with assets in the environment and transmit sensor readouts to applications that perform analytics. These applications typically reside on the network core and, in turn, process the readouts that trigger the transmission of actuation commands to the device. One important issue in these schemes is the nature of the communication channels. Most devices are wireless and therefore they are affected by the effects of signal multipath fading that results in application loss. More importantly, these impairments may cause actuation commands to be lost or to be critically delayed. In this context, several standard mechanisms have been proposed for the transmission of traffic from the application to the devices. They fall under two main architectural categories: (1) Representational State Transfer (REST) and (2) Event Driven Architecture (EDA). In this paper, we analyze two protocols associated with each of these two architectures by comparing them in order to assess their efficiency in IoT actuation solutions. This analysis leads to the development of a mathematical model that enables the dynamic selection of the right technology based on network impairments.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"44 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78779145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on Machine Learning for Intelligent Routing, Key Requirement and Challenges Towards 6G 面向6G智能路由的机器学习、关键需求和挑战综述
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-07-21 DOI: 10.37256/cnc.1220233039
Bidyarani Langpoklakpam, Lithungo K Murry
{"title":"Review on Machine Learning for Intelligent Routing, Key Requirement and Challenges Towards 6G","authors":"Bidyarani Langpoklakpam, Lithungo K Murry","doi":"10.37256/cnc.1220233039","DOIUrl":"https://doi.org/10.37256/cnc.1220233039","url":null,"abstract":"The constant desire for faster data rates, lower latency, improved reliability, global device integration, and pervasiveness are some of the factors driving the development of next-generation communication systems. Sixth-generation (6G) networks have received a lot of attention from the industry and academics as fifth-generation (5G) communications are being rolled out globally. With the proliferation of smart devices and the Internet of Things (IoT), 6G networks will require ultra-reliable and low-latency communication. Routing protocols have a significant role in improving the performance of a network. Traditional routing techniques will have difficulty coping with the highly complex and dynamic 6G environments. Recently, machine learning (ML), a key component of artificial intelligence, is emerging as the key to managing complex and dynamic networks efficiently. However, there are still several significant challenges that need to be addressed. In this paper, we provide an overview of current machine-learning techniques used in network routing. Lastly, we highlight open research problems that need to be addressed and prospects for future research.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"44 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90956550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synergy Between 6G and AI: Open Future Horizons and Impending Security Risks 6G和人工智能的协同:打开未来的视野和迫在眉睫的安全风险
Journal of Computer Networks and Communications Pub Date : 2023-06-07 DOI: 10.37256/cnc.1120232969
Elias Yaacoub
{"title":"Synergy Between 6G and AI: Open Future Horizons and Impending Security Risks","authors":"Elias Yaacoub","doi":"10.37256/cnc.1120232969","DOIUrl":"https://doi.org/10.37256/cnc.1120232969","url":null,"abstract":"This paper explores the potential synergies between 6G and AI, arguing that their combination has the power to unlock new horizons by addressing future challenges in healthcare, transportation, virtual reality, education, resource management, robotics, public safety, and warfare. However, these opportunities also come with greater risks. Therefore, the paper provides an overview of the security risks and challenges associated with this convergence, as well as possible mitigation techniques.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135494058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust and Risk Assessment in IoT Networks 物联网网络中的信任与风险评估
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-05-30 DOI: 10.37256/cnc.1120232667
J. Hemmes, Steven Fulton, Judson C. Dressler, Stephen Kirkman
{"title":"Trust and Risk Assessment in IoT Networks","authors":"J. Hemmes, Steven Fulton, Judson C. Dressler, Stephen Kirkman","doi":"10.37256/cnc.1120232667","DOIUrl":"https://doi.org/10.37256/cnc.1120232667","url":null,"abstract":"The Internet of Things (IoT) is a large-scale, heterogeneous ecosystem of connected devices encompassing a range of purposes and computing capabilities. As IoT systems grow ubiquitous, new approaches to security are needed. This work proposes a method of risk assessment for devices that combines the use of trust models based on dynamic behaviors with static capability profiles drawn from immutable device characteristics to determine the level of risk each device poses to network security. A risk-based approach allows security mechanisms and monitoring activities to be more efficiently allocated across IoT networks. Simultaneously, devices can be allowed a greater degree of functionality while ensuring system availability and security. This paper presents a methodology and architecture to integrate risk assessment into IoT networks. This allows additional tailoring of security control application and provides higher-level, more human-readable information for security analysts.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"37 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75209628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Obtaining Stable Parameter Estimates Using Experimentally Obtained Delay Values in a Cellular Mobile Network 一种利用实验获得的蜂窝移动网络延迟值获得稳定参数估计的方法
IF 2
Journal of Computer Networks and Communications Pub Date : 2023-05-26 DOI: 10.37256/cnc.1120232829
Aleksandrs Kutins, Deniss Brodņevs
{"title":"An Approach to Obtaining Stable Parameter Estimates Using Experimentally Obtained Delay Values in a Cellular Mobile Network","authors":"Aleksandrs Kutins, Deniss Brodņevs","doi":"10.37256/cnc.1120232829","DOIUrl":"https://doi.org/10.37256/cnc.1120232829","url":null,"abstract":"The ability to describe experimentally obtained delay values in a cell of a mobile cellular network allows not only describing the properties of cell delays using only a few parameters, but also to simulate delay values. Unfortunately, occasionally occurring temporary unstable operation of a cellular network, caused by various negative factors, leads to a noticeable increase in delays and, as a result, to a significant distortion of the obtained delay parameters estimates. For this reason, estimates of the delay parameters in a cell should be obtained from experimental data obtained at the time of stable operation of the network. Due to the large amount of experimentally obtained data, the process of checking experimentally obtained delay values for the presence of anomalies should be performed on the application of simple criteria. The aim of this paper is to show an approach to obtaining stable parameter estimates of delay in a cell of a mobile cellular network. The article describes the factors that affect delays stability, assesses the degree of their influence, and also highlights properties that can be used to recognize phenomena that adversely affect the value and stability of delays in order to exclude such experimentally obtained data from the evaluation.","PeriodicalId":45621,"journal":{"name":"Journal of Computer Networks and Communications","volume":"30 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89950216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信