Computer Networks and Communications最新文献

筛选
英文 中文
Analysis of Path Convergence in Chord DHT 和弦 DHT 的路径收敛分析
Computer Networks and Communications Pub Date : 2024-07-25 DOI: 10.37256/cnc.2220244753
Vladimir Rocha, Daniel Czeresnia, Carlo Kleber da Silva Rodrigues
{"title":"Analysis of Path Convergence in Chord DHT","authors":"Vladimir Rocha, Daniel Czeresnia, Carlo Kleber da Silva Rodrigues","doi":"10.37256/cnc.2220244753","DOIUrl":"https://doi.org/10.37256/cnc.2220244753","url":null,"abstract":"Chord is a Distributed Hash Table widely used for its efficiency in searching for information. The efficiency of this structure relies on creating short paths of O(log2 n) between two nodes, in which n is the number of nodes. To enhance efficiency, several studies use replication in the nodes belonging to the network, assuming that searches will converge in these replicated nodes. This work proposes a convergence formula and analyzes the number of searches converging on nodes for different network sizes (small, medium, and large), up to one million nodes. The experiments show that the convergence creates three zones and the results support the replication techniques from previous studies and demonstrate that it is feasible to replicate in nodes that were not considered in these studies.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"38 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141804113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Cloud Resource Allocation in Federated Environments through Outsourcing Strategies 通过外包策略优化联盟环境中的云资源分配
Computer Networks and Communications Pub Date : 2024-07-08 DOI: 10.37256/cnc.2220244747
Arash Mazidi
{"title":"Optimizing Cloud Resource Allocation in Federated Environments through Outsourcing Strategies","authors":"Arash Mazidi","doi":"10.37256/cnc.2220244747","DOIUrl":"https://doi.org/10.37256/cnc.2220244747","url":null,"abstract":"Cloud computing enables users to access required resources, with the invention of high-end devices leading to exponential increases in cloud resource requests. This poses significant challenges for resource management due to the scale of the cloud and unpredictable user demands. This paper presents an approach to managing resources during peak request periods for virtual machines (VMs) by leveraging cloud federation, outsourcing requests to other federation members. An algorithm is proposed to initiate cloud federation and allocate customer requests within it. The primary objectives are to increase the profit of cloud providers and improve resource utilization. An ensemble algorithm maximizes profit using both the proposed algorithm and three established ones. Experimental results demonstrate that our method outperforms existing approaches in profit, resource utilization, and rejected requests in most scenarios.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"105 51","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141667034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeAuth: A Decentralized Authentication and Authorization Scheme for Secure Private Data Sharing DeAuth:用于安全私人数据共享的去中心化认证和授权方案
Computer Networks and Communications Pub Date : 2024-07-05 DOI: 10.37256/cnc.2220244281
Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo
{"title":"DeAuth: A Decentralized Authentication and Authorization Scheme for Secure Private Data Sharing","authors":"Phillipe Austria, Yoohwan Kim, Ju-Yeon Jo","doi":"10.37256/cnc.2220244281","DOIUrl":"https://doi.org/10.37256/cnc.2220244281","url":null,"abstract":"The sharing of private information is a daunting, multifaceted, and expensive undertaking. Furthermore, identity management is an additional challenge that poses significant technological, operational, and legal obstacles. Present solutions and their accompanying infrastructures rely on centralized models that are susceptible to hacking and can hinder data control by the rightful owner. Consequently, blockchain technology has generated interest in the fields of identity and access control. This technology is viewed as a potential solution due to its ability to offer decentralization, transparency, provenance, security, and privacy benefits. Nevertheless, a completely decentralized and private solution that enables data owners to control their private data has yet to be presented. In this research, we introduce DeAuth, a novel decentralized, authentication and authorization scheme for secure private data transfer. DeAuth combines blockchain, smart-contracts, decentralized identity, and distributed peer-to-peer (P2P) storage to give users more control of their private data, and permissioning power to share without centralized services. For this scheme, identity is proven using decentralized identifiers and verifiable credentials, while authorization to share data is performed using the blockchain. A prototype was developed using the Ethereum Blockchain and the InterPlanetary Files System, a P2P file sharing protocol. We evaluated DeAuth through a use-case study and metrics such as security, performance, and cost. Our findings indicate DeAuth to be viable alternative to using centralized services; however, the underlying technologies are still in its infancies and require more testing before it can supplant traditional services.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":" 28","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141676004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FaceLite: A Real-Time Light-Weight Facemask Detection Using Deep Learning: A Comprehensive Analysis, Opportunities, and Challenges for Edge Computing FaceLite:使用深度学习的实时轻量面罩检测:边缘计算的全面分析、机遇与挑战
Computer Networks and Communications Pub Date : 2024-05-13 DOI: 10.37256/cnc.2120244439
Anup Kumar Paul
{"title":"FaceLite: A Real-Time Light-Weight Facemask Detection Using Deep Learning: A Comprehensive Analysis, Opportunities, and Challenges for Edge Computing","authors":"Anup Kumar Paul","doi":"10.37256/cnc.2120244439","DOIUrl":"https://doi.org/10.37256/cnc.2120244439","url":null,"abstract":"The edge computing devices running models based on deep learning have drawn a lot of interest as a prominent way of handling various applications based on AI. Due to limited memory and computing resources, it is still difficult to deploy deep learning models on edge devices in a production context with effective inference. This study examines the deployment of a lightweight facemask detection model on edge devices with real-time inference. The proposed framework uses a dual-stage convolutional neural network (CNN) architecture with two main modules that use Caffe-DNN for face detection and a proposed model based on CNN architecture or customized models based on transfer learning (e.g., MobileNet-v2, resNet50, denseNet121, NASNetMobile, Inception-v3, and XceptionNet) for facemask classification. The study does numerous analyses based on the models' performance in terms of accuracy, precision, recall, and F1-score and compares all models with low disk size and good accuracy as the main priorities for memory-constrained edge devices. The proposed CNN model for facemask detection outperforms other state-of-the-art models in terms of accuracy, achieving 99%, 99%, and 99% on the training, validation, and testing, respectively, with the facemask detection ~12K image datasets available on Kaggle. This accuracy is comparable to other transfer learning-based models, and it also achieves the smallest number of total trainable parameters and, thus, the smallest disk size of all models.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"62 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140984850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model 双向中继网络模型中计算与前向中继的信道预编码
Computer Networks and Communications Pub Date : 2024-03-29 DOI: 10.37256/cnc.2120244057
Jeyalakshmi Vijayarajan, S. T. Selvi
{"title":"Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model","authors":"Jeyalakshmi Vijayarajan, S. T. Selvi","doi":"10.37256/cnc.2120244057","DOIUrl":"https://doi.org/10.37256/cnc.2120244057","url":null,"abstract":"Physical layer Network Coding (PNC) is a promising strategy to improve the spectral efficiency in a relay-based wireless transmission. This paper employs lattice-based channel coding at the source nodes for better performance during Multiple Access Channel (MAC) phase transmission. The achievable transmission rate in various PNC relaying such as Decode and Forward (DF), Amplify and Forward (AF), and Compute and Forward (CF) for the Two Way Relay Network model (TWRN) is derived and simulated through MATLAB software and analyzed. The analysis shows that the rate performance of CF relaying outperforms other relaying techniques in the Additive White Gaussian Noise (AWGN) channel, but it degrades for the Rayleigh fading channel. To mitigate the fading effects, channel aware precoding technique is employed at source nodes, Bit Error Rate (BER) and Symbol Error Rate (SER) performance are analyzed for CF relaying, and Monte Carlo simulations are used to demonstrate the theoretical results. Channel precoding performance of CF relaying is compared with DF relaying.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"62 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140364848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Framework for Security Assessment of Android Mobile Banking Applications 安卓移动银行应用安全评估框架
Computer Networks and Communications Pub Date : 2024-03-07 DOI: 10.37256/cnc.2120243929
Loïc D. Tsobdjou, Samuel Pierre, A. Quintero
{"title":"A Framework for Security Assessment of Android Mobile Banking Applications","authors":"Loïc D. Tsobdjou, Samuel Pierre, A. Quintero","doi":"10.37256/cnc.2120243929","DOIUrl":"https://doi.org/10.37256/cnc.2120243929","url":null,"abstract":"\u0000Mobile banking applications make users' daily lives easier by allowing them to access banking services, such as balance inquiries and bill payments, anytime and anywhere. Since these applications manage very sensitive financial data, special attention must be paid to data security. Several works in the literature assess the security of mobile banking applications. However, we observe the lack of a widely adopted framework among researchers for assessing the security of mobile banking applications. In this paper, we propose a framework consisting of twenty-six criteria for assessing the security of Android mobile banking applications. These criteria are divided into five categories: mobile device security, data in transit, data storage, cryptographic misuse, and others. Subsequently, we evaluate the proposed framework based on predefined requirements. These requirements are no redundancy, no ambiguity, and comprehensiveness. As a case study, we assess the security of the Android mobile banking applications of seven major Canadian banks. The results show that data in transit is adequately protected by these applications.\u0000","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"20 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140259730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review 医疗保健领域可穿戴无线传感器的安全性和隐私性:系统回顾
Computer Networks and Communications Pub Date : 2024-02-05 DOI: 10.37256/cnc.2120243852
Ranjit Kaur, Seyed Shahrestani, Chun Ruan
{"title":"Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review","authors":"Ranjit Kaur, Seyed Shahrestani, Chun Ruan","doi":"10.37256/cnc.2120243852","DOIUrl":"https://doi.org/10.37256/cnc.2120243852","url":null,"abstract":"Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139864557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review 医疗保健领域可穿戴无线传感器的安全性和隐私性:系统回顾
Computer Networks and Communications Pub Date : 2024-02-05 DOI: 10.37256/cnc.2120243852
Ranjit Kaur, Seyed Shahrestani, Chun Ruan
{"title":"Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review","authors":"Ranjit Kaur, Seyed Shahrestani, Chun Ruan","doi":"10.37256/cnc.2120243852","DOIUrl":"https://doi.org/10.37256/cnc.2120243852","url":null,"abstract":"Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"22 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139804745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism for Efficient Media Propagation in Event-Driven Cyber-Physical Systems 事件驱动网络物理系统中的高效媒体传播机制
Computer Networks and Communications Pub Date : 2024-01-26 DOI: 10.37256/cnc.2120243999
Rolando Herrero
{"title":"Mechanism for Efficient Media Propagation in Event-Driven Cyber-Physical Systems","authors":"Rolando Herrero","doi":"10.37256/cnc.2120243999","DOIUrl":"https://doi.org/10.37256/cnc.2120243999","url":null,"abstract":"Many key applications in Cyber-Physical Systems require the transmission of speech, audio, or video. These scenarios involve the use of traditional Real-Time Communication (RTC) protocols and technologies, which cannot always be used in the context of core networks. This is particularly critical in the context of Event-Driven Architectures (EDAs), where RTC protocols require the use of complex topologies that rely on costly infrastructure. One way to avoid this is by encapsulating all media traffic in EDA protocols. However, this approach does not come without challenges. Specifically, the nature of the transport protocols causes the media to be heavily affected by application layer impairments that render their usage highly impractical. To prevent this from happening, this paper introduces a unified scheme that supports the efficient encapsulation of media traffic in EDA scenarios. This is accomplished through a mechanism that relies on a Machine Learning (ML) model that is exercised in an experimental framework.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"65 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139593764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Model for CM-3 Scenario Over Generalized Distribution Under Various Window Functions 各种窗口函数下广义分布的 CM-3 场景通道模型
Computer Networks and Communications Pub Date : 2024-01-22 DOI: 10.37256/cnc.2120244017
Shekhar Singh, S. P. Singh, L. M
{"title":"Channel Model for CM-3 Scenario Over Generalized Distribution Under Various Window Functions","authors":"Shekhar Singh, S. P. Singh, L. M","doi":"10.37256/cnc.2120244017","DOIUrl":"https://doi.org/10.37256/cnc.2120244017","url":null,"abstract":"In terms of fundamental research and technology development level, Wireless Body Area Network (WBAN) is a well-established paradigm of wireless system. However, like any wireless system, channel modeling of WBAN is one of the most challenging research eras. Also, literature suggests Channel Model-3, termed as CM-3 scenario based on the positioning of the Nano antenna, is one of the most useful deployment scenarios of WBAN. Further, arrival time and the number of arrivals, which plays an important role in the CM-3 scenario of WBAN, are modeled using the Poisson distribution.  However, in Poisson distribution the variance and mean are equal and the probability of success is kept fixed. Hence, the versatility of the channel model based Poisson distribution is limited due to limited parameters. On the other hand, Negative Binomial (NB) distribution with extra parameters is a more general distribution. Therefore, this manuscript employs Negative Binomial distribution to present a more general channel model under the CM-3 scenario. In addition, effects of different windowing techniques, such as Bartlett and Gaussian window, on the channel model are analyzed under both, Poisson distribution and Negative Binomial distributions.","PeriodicalId":505128,"journal":{"name":"Computer Networks and Communications","volume":"9 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139609541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信