{"title":"Multitier scalable clustering wireless network design approach using honey bee ratel optimization","authors":"Amruta Amune, Himangi Pande","doi":"10.3233/jhs-230086","DOIUrl":"https://doi.org/10.3233/jhs-230086","url":null,"abstract":"Wireless sensor networks (WSNs) have emerged as a one of the most fascinating areas of lookup in the past few years principally due to its massive quantity of workable applications. However limited energy, node deployment strategy, routing techniques has considerable impact on the overall performance of network. This paper proposes sustainable honey bee ratel based hybrid wireless sensor network (SHHWSN) layering framework for improving load balancing and scalability issues in network. In SHHWSN tessellated hexagonal shape clusters are formed to cover entire geographical region without any gaps. Hybrid routing schema constrained with redundant data identification policy used in this, seeks to optimize energy utilization. The proposed SHHWSN was evaluated and validated by simulation, and the results were compared with earlier schematics where mostly one sided stochastic node deployments were followed. The experimental results show that SHHWSN has superior performance in terms of network alive nodes, delay, energy and throughput. The proposed SHHWSN obtained values of 50 nodes is 3, 0.061, 0.14, 0.89, 100 nodes is 3,0.037, 0.19, 0.551, 150 nodes is 13, 0.081, 0.23, 0.415, and 200 nodes is 23, 1.01, 0.25, 0.356, which is significantly more effective than current techniques.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"34 7","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmit antenna selection in M-MIMO system using metaheuristic aided model","authors":"Charanjeet Singh, Pawan Kumar Singh","doi":"10.3233/jhs-230087","DOIUrl":"https://doi.org/10.3233/jhs-230087","url":null,"abstract":"Massive MIMO (M-MIMO) devices are the key tool to meet the performance stards established for 5G-wireless communication. However, more Radio Frequency (RF) chains needed in base station (BS) with a huge count of transmitting antennas, involve expensive hardware and computing complexities. In order to decrease the RF chains needed in BS, this work intended to use the optimal transmit antenna selection (TAS) strategy. This strategy is gaining a lot of interest since the optimization algorithm aids in the ability to enhance the system performance considerably the efficiency and secrecy rate. This work proposes a novel Coati Adopted Pelican Optimization (CA-PO) for choosing the optimal TA by considering efficiency as well as secrecy rate. In addition, the CA-PO algorithm makes the decision on which antenna to be elected. At last, the supremacy of CA-PO-based TAS is proven from the analysis regarding secrecy rate and EE analysis. Accordingly, the proposed CA-PO method for MF for set up 2 has attained a higher EE of 0.976; whereas, the DMOA, COA, MRFO, POA and BEA techniques have got a relatively lower EE of 0.968.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"54 26","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139390006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison study of two implemented fuzzy-based models for decision of logical trust","authors":"Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.3233/jhs-230189","DOIUrl":"https://doi.org/10.3233/jhs-230189","url":null,"abstract":"In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based System for Decision of Logical Trust (FSDLT). We implement two models: FSDLTM1 and FSDLTM2. The FSDLTM1 considers three input parameters: Belief (Be), Experience (Ep), Rationality (Ra) and the output parameter is LT. In FSDLTM2, we consider Reliability (Re) as a new parameter. We evaluated the implemented models by computer simulations. The simulation results show that when Be, Ep, Ra and Re are increasing, the LT is increased. For FSDLTM1, when Ep value is 0.9, all LT values are greater than 0.5. While for FSDLTM2, in case when Be is 0.9, for all values of Ra and Re, when Ep is 0.5 and 0.9, all LT values are higher than 0.5. This shows that the person or device is trustworthy. The FSDLTM2 is more complex than FSALTM1 but it makes a better decision for LT by considering four input parameters.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"69 9","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139164107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Ke Jiang
{"title":"Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of things","authors":"Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Ke Jiang","doi":"10.3233/jhs-222009","DOIUrl":"https://doi.org/10.3233/jhs-222009","url":null,"abstract":"In order to study the operating characteristics of variable speed constant frequency wind turbine under different working conditions and the monitoring system of wind turbine. In this paper, the simulation model of each component system of wind turbine is established by MATLAB/Simulink module, and the influence law of different wind speed and ground fault types on the output power of wind turbine is studied. The active power of wind turbines under different short-circuit fault types is compared. At the same time, in order to realize real-time monitoring of wind turbine speed and output power, an online monitoring system for wind turbine operation based on industrial Internet of Things is proposed, and the composition and operation characteristics of this remote monitoring system are given. The practical application shows that the on-line monitoring system can accurately and remotely monitor the running status of the wind turbine and avoid the unstable running of the wind turbine. The research conclusions of this paper can provide reference for the design and construction of wind turbines and the operation of connecting to the power grid.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"101 14","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient dynamic IP datacasting mobility management based on LRS in mobile IP networks","authors":"SangYeob Oh, ChulHo Park","doi":"10.3233/jhs-222035","DOIUrl":"https://doi.org/10.3233/jhs-222035","url":null,"abstract":"IP mobility support is based on terminal behavior, recognizing mobility and maintaining a continuous communication session. The existing mobile IP location registration sends a message to one or more routers during a handoff within a domain by using a multicast address to process messages continuously. This implementation requires persistent message processing among all routers to determine new multicast address assignments. To solve this problem, we propose a method that enables the mobile user to obtain a QoS guarantee when the mobile device moves to an overlapping area under the mobile IP. Therefore, dynamic mobility management includes location updates under the mobile IP, and transmission of packets from the expected access points. When a handoff occurs while the mobile device is connected, the mobile host dynamically adapts to the mobility characteristics of the mobile node and transmits missed packets. In addition, by first using a location router, handoff latency reduction and packet loss requirements between domains in the overlapping mobile network environment are resolved. Second, the proposed algorithm has low-control traffic in the mobile network, allowing quick handoffs. Although instantaneous throughput is reduced during handoffs, tunneling is reduced by 10-30%, even after a handoff, by retransmitting packets missed by the mobile host, while location-registration-update times are reduced by 20-80%.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"76 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139212700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fine-grained load balancing with proactive prediction and adaptive rerouting in data center","authors":"Weimin Gao, Jiaming Zhong, Caihong Peng, Xinlong Li, Xiangbai Liao","doi":"10.3233/jhs-230003","DOIUrl":"https://doi.org/10.3233/jhs-230003","url":null,"abstract":"Though the existing load balancing designs successfully make full use of available parallel paths and attain high bisection network bandwidth, they reroute flows regardless of their dissimilar performance requirements. But traffic in modern data center networks exhibits short bursts characteristic, which can easily lead to network congestion. The short flows suffer from the problems of large queuing delay and packet reordering, while the long flows fail to obtain high throughput due to low link utilization and packet reordering. In order to solve these inefficiency, we designed a fine-grained load balancing method (FLB), which uses an active monitoring mechanism to split traffic, and flexibly transfers flowlet to non-congested path, effectively reducing the negative impact of burst flow on network performance. Besides, to avoid packet reordering, FLB leverages the probe packets to estimate the end-to-end delay, thus excluding paths that potentially cause packet reordering. The test results of NS2 simulation show that FLB significantly reduces the average and tail flow completion time of flows by up to 59% and 56% compared to the state-of-the-art multi-path transmission scheme with less computational overhead, as well as increases the throughput of long flow.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"120 49","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security","authors":"C.P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari","doi":"10.3233/jhs-230028","DOIUrl":"https://doi.org/10.3233/jhs-230028","url":null,"abstract":"IoT networks can be defined as groups of physically connected things and devices that can connect to the Internet and exchange data with one another. Since enabling an increasing number of internets of things devices to connect with their networks, organizations have become more vulnerable to safety issues and attacks. A major drawback of previous research is that it can find out prior seen types only, also any new device types are considered anomalous. In this manuscript, IoT device type detection utilizing Training deep quantum neural networks optimized with a Chimp optimization algorithm for enhancing IOT security (IOT-DTI-TDQNN-COA-ES) is proposed. The proposed method entails three phases namely data collection, feature extraction and detection. For Data collection phase, real network traffic dataset from different IoT device types are collected. For feature mining phase, the internet traffic features are extracted through automated building extraction (ABE) method. IoT device type identification phase, Training deep quantum neural networks (TDQNN) optimized with Chimp optimization algorithm (COA) is utilized to detect the category of IoT devices as known and unknown device. IoT network is implemented in Python. Then the simulation performance of the proposed IOT-DTI-TDQNN-COA-ES method attains higher accuracy as26.82% and 23.48% respectively, when compared with the existing methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"3 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficiency of cache collaboration in core content distribution networks","authors":"Niemah Izzeldin Osman","doi":"10.3233/jhs-230018","DOIUrl":"https://doi.org/10.3233/jhs-230018","url":null,"abstract":"With escalating demands for high-definition video, cache collaboration allows neighbor nodes to share locally stored content in order to reduce download traffic. High energy consumption associated with content delivery remains a concern for Content Distribution Networks (CDNs). Therefore, this paper proposes cluster-based collaborative caching in a core network employing IP over WDM. The aim is to allow sets of core caches to fully share content while minimizing power. A Mixed Integer Linear Programming (MILP) model is used to form energy-efficient cache clusters. The energy consumption of the network is evaluated under different cluster sizes to find the optimum size that minimizes energy. To evaluate the influence of content popularity distribution, a heavy-tailed Zipf distribution and an Equal popularity distribution are evaluated. In addition, the work investigates the influence of downlink traffic behavior and power consumption parameters on optimum cluster sizes. Attained results reveal that maximum savings in energy consumption introduced by cluster-based collaborative caching are up to 34.3% and 21.8% under the Zipf and Equal distribution, respectively. Cache collaboration is not recommended when all core nodes contain fully replicated content servers. Results also show that power consumption parameters do not influence cluster formation. It is recommended keeping cache collaboration in the core network simple, so as to reduce intra-cluster communication.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"63 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134905983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients","authors":"Leonard Barolli","doi":"10.3233/jhs-230093","DOIUrl":"https://doi.org/10.3233/jhs-230093","url":null,"abstract":"In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of these router replacement methods for small and middle scale WMNs. We assessed the performance by computer simulations. The simulation results show that six methods have a good performance for connectivity and coverage metrics, for both small and middle scale WMNs. However, they have different behavior for load balancing. For small scale WMNs, the load balancing of LDIWM, RIWM and FC-RDVM is better than CM, LDVM and RDVM. While, comparing LDIWM, RIWM and FC-RDVM, the LDIWM has better load balancing. We found that the load balancing for small scale WMNs is not good, because there is a concentration of mesh routers in some areas. For middle scale WMNs, the CM, LDIWM, LDVM and RDVM have not a good load balancing. While, the RIWM and FC-RDVM have better performance. Comparing RIWM and FC-RDVM, we found that the load balancing of FC-RDVM is better than RIWM.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135315423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan
{"title":"Deep learning trends and future perspectives of web security and vulnerabilities","authors":"Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan","doi":"10.3233/jhs-230037","DOIUrl":"https://doi.org/10.3233/jhs-230037","url":null,"abstract":"Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}