Journal of High Speed Networks最新文献

筛选
英文 中文
AD-RED: A new variant of random early detection AQM algorithm AD-RED:一种新的随机早期检测AQM算法
Journal of High Speed Networks Pub Date : 2023-10-10 DOI: 10.3233/jhs-222055
Samuel Hassan
{"title":"AD-RED: A new variant of random early detection AQM algorithm","authors":"Samuel Hassan","doi":"10.3233/jhs-222055","DOIUrl":"https://doi.org/10.3233/jhs-222055","url":null,"abstract":"Intensive continuing research has been noticed among scholars in the literature with a particular appreciable interest in developing new enhanced variants for the long-standing Random Early Detection (RED) algorithm. Contemporary trends shows that researchers continue to follow a research line thereby exchanging the linear curve needed in RED with nonlinear curves. Several reports have shown that RED’s sole linear function is insufficiently powered for managing rising degrees of traffic congestion in the network. In this paper, Amended Dropping – Random Early Detection (AD-RED), a revised version of RED is presented. AD-RED algorithm consists in combining two nonlinear packet dropping functions: quadratic plus exponential. What’s more, results from ns-3 simulator shows that AD-RED reasonably stabilized and minified the (average) queue size; and obtained a whittled down end-to-end delay when compared with RED itself and another variant of RED. Hence, AD-RED is offered as a fully sufficient replacement for RED’s algorithm implementation in routers.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136293236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LEOCN: Real-time and complete network simulation framework for LEO constellation networks1 LEO星座网络实时、完整的网络仿真框架1
Journal of High Speed Networks Pub Date : 2023-09-29 DOI: 10.3233/jhs-222061
Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He
{"title":"LEOCN: Real-time and complete network simulation framework for LEO constellation networks1","authors":"Cong Li, Haiyang Wang, Weipeng Liang, Yunhao Li, Hongyang Yan, Teng Huang, Bo Li, Jianwei He","doi":"10.3233/jhs-222061","DOIUrl":"https://doi.org/10.3233/jhs-222061","url":null,"abstract":"With the development of the space industry, LEO simulation platforms are increasingly important. Prior work mainly focused on the dynamics of constellation topology, routing algorithms against the topological motion, and the behavior of LEO constellation networks, but neglected real-time and completeness properties. In our work, we design a real-time and complete network simulation framework, named LEOCN, that is more meaningful and detailed for researchers than previous work on LEO satellite constellation simulations. LEOCN is supported by Linux System, which makes the framework more realistic and relieves the computational burden. Meanwhile, LEOCN deeply considers topology and routing algorithms, visualization, satellite mobility, communication protocols, and network traffic problems. On LEOCN, we can deploy routing algorithm experiments via SDN. We evaluate the performance of LEOCN in large-scale constellation scenarios, and the results demonstrate the superiority of the real-time and complete network simulation framework.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135194375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-based proxy blind signature scheme on lattice in high-speed network environment 高速网络环境下基于格的身份代理盲签名方案
Journal of High Speed Networks Pub Date : 2023-09-13 DOI: 10.3233/jhs-222021
Mengjiao Yang, Dongmei Ke, Fengyin Li
{"title":"Identity-based proxy blind signature scheme on lattice in high-speed network environment","authors":"Mengjiao Yang, Dongmei Ke, Fengyin Li","doi":"10.3233/jhs-222021","DOIUrl":"https://doi.org/10.3233/jhs-222021","url":null,"abstract":"The methods of network attacks are becoming more and more diverse In high-speed networks, and protecting private data is a key issue for users’ security. Proxy blind signature technology combines proxy and blind signature technology to achieve signature transitivity and message confidentiality. However, current signature schemes will not be secure in quantum environments. Meanwhile, the certificate storage of the existing scheme is relatively complicated. Therefore, to avoid the need for certificates and resist quantum attacks, this paper proposes an anti-quantum identity-based proxy blind signature (ID-Proxy-BS) scheme on lattice. This ID-Proxy-BS scheme improves the efficiency of signature through Gaussian distribution and sampling techniques. Security analysis shows that the scheme satisfies correctness, efficiency, blindness, and unforgeability.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135785005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection using rough-fuzzy set and parallel quantum genetic algorithm 基于粗糙模糊集和并行量子遗传算法的入侵检测
IF 0.9
Journal of High Speed Networks Pub Date : 2023-08-30 DOI: 10.3233/jhs-222070
Zhang Ling, Gui Qi, Huang Min
{"title":"Intrusion detection using rough-fuzzy set and parallel quantum genetic algorithm","authors":"Zhang Ling, Gui Qi, Huang Min","doi":"10.3233/jhs-222070","DOIUrl":"https://doi.org/10.3233/jhs-222070","url":null,"abstract":"An intrusion detection method using rough-fuzzy set and parallel quantum genetic algorithm (RFS-QGAID) is proposed in this paper. The RFS-QGAID is applied to solve the serious problems of determining the optimal antibodies subsets used to detect an anomaly. To obtain a simplified antibodies collection for high dimensional Log data sets, RFS is applied to delete the redundant antibody features and obtain the optimal antibodies features combination. Then, the optimal attitudes are entered into the QGA classifier for learning and training in the following stage. At last, the detected Log antigens are fed into RFS-QGAID, and we can classify the intrusion types. With RFS-QGAID, we give the simulations, the results on real Log data sets show that: the higher detection accuracy of RFS-QGAID is higher detection accuracy, but the false negative rate is lower for small samples sets, the adaptive performance is higher than other detection algorithms.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49660622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal relay nodes placement with game theory optimization for Wireless Sensor Networks 基于博弈论的无线传感器网络中继节点优化配置
IF 0.9
Journal of High Speed Networks Pub Date : 2023-08-29 DOI: 10.3233/jhs-222038
S. Radha, G. Bala, Nalluri Prophess Rajkumar, G. Indumathi, P. Nagabushanam
{"title":"Optimal relay nodes placement with game theory optimization for Wireless Sensor Networks","authors":"S. Radha, G. Bala, Nalluri Prophess Rajkumar, G. Indumathi, P. Nagabushanam","doi":"10.3233/jhs-222038","DOIUrl":"https://doi.org/10.3233/jhs-222038","url":null,"abstract":"Wireless Sensor Networks (WSN) play a major role in the wide variety of applications like underground pipeline and leaks monitoring, temperature distribution monitoring in industrial cyber systems, military, forest life monitoring, and environmental and geographical monitoring. Sensors are widely used in these different applications. The number of sensors and the application concerned mainly decides the energy consumption, network lifetime. In this process relay nodes may help the sensors as backbone to connect with sink node or base stations. In this paper, we introduce a new approach for relay node selection in WSN to minimize the energy consumption of the network. It uses channel aware relay selection technique using game theory optimization and act as a virtual backbone in connecting to the base station. However, the relay nodes are varied to check the optimal number of relays required for the small, medium and large number of nodes deployed in the network. Simulations are carried out using Network Simulator NS-2.35 and network is analyzed in wide variety of scenarios. Results show that the proposed relay node selection algorithm reduces energy consumption, improves lifetime, throughput of the network.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43501116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system 一种改进的具有信任值评估的PBFT共识机制在农产品可信追溯系统中的应用
IF 0.9
Journal of High Speed Networks Pub Date : 2023-08-28 DOI: 10.3233/jhs-222077
Weiqing Sun, Shengxin Wang, Shen Wei, Pengfei Cao, Yan Zhao, Lechao Xi, Xinlu Liu, Lihua Wang
{"title":"An improved PBFT consensus mechanism with trust value evaluation application in the agricultural product trusted traceability system","authors":"Weiqing Sun, Shengxin Wang, Shen Wei, Pengfei Cao, Yan Zhao, Lechao Xi, Xinlu Liu, Lihua Wang","doi":"10.3233/jhs-222077","DOIUrl":"https://doi.org/10.3233/jhs-222077","url":null,"abstract":"Blockchain has the advantages of tamper proof, high reliability and traceability, so it can better support the agricultural product traceability system. However, the agricultural product supply chain has the characteristics of long chain and decentralized production, which makes the application of the combination of blockchain technology and agricultural product traceability have many nodes, large system overhead and other problems. In order to solve the above problems, this paper proposes a Practical Byzantine Fault Tolerance (PBFT) consensus mechanism based on trust value evaluation, and uses this optimization algorithm to propose an architecture model to meet the demand for trusted traceability of agricultural product supply chain, so as to realize the distributed storage and security protection of supply chain data. In order to ensure the effective operation of the blockchain system, this paper studies the consensus mechanism in the blockchain network, designs a trust value evaluation model to calculate the trust value of nodes, and selects trusted nodes to join the consensus group based on the trust value, which ensures the credibility of the consensus nodes. At the same time, the consistency protocol is optimized to reduce the communication overhead in the consensus process. The experimental results show that the consensus mechanism improved in this paper has certain advantages in communication overhead, transaction delay and throughput. Compared with the existing storage model, the model described in this paper has higher security and throughput efficiency, effectively ensures the reliable traceability of data, and can be better applied to the traceability scenario of agricultural product supply chain.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45946779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lattice-based efficient heterogeneous signcryption scheme for secure network communications 一种基于格的高效异构签名加密方案,用于安全网络通信
IF 0.9
Journal of High Speed Networks Pub Date : 2023-08-25 DOI: 10.3233/jhs-222020
Siqi Yu, Mengxue Shang, Fengyin Li
{"title":"A lattice-based efficient heterogeneous signcryption scheme for secure network communications","authors":"Siqi Yu, Mengxue Shang, Fengyin Li","doi":"10.3233/jhs-222020","DOIUrl":"https://doi.org/10.3233/jhs-222020","url":null,"abstract":"Ensuring the security of transmitted content is an important task in network communication. Signcryption technology combines signature and encryption operations in a single step to achieve message authentication and confidentiality. In practical applications, users are usually in different cryptographic systems, the ordinary signcryption technology cannot realize communication between two different cryptographic systems. And the ciphertext structure of the existing signcryption schemes is relatively complex, signcryption is not efficient. Therefore, in order to solve the problem of efficient communication between different cryptosystems and ensure quantum security, this paper proposes a lattice-based efficient heterogeneous signcryption scheme for secure network communications. This signcryption scheme accomplishes signcryption through matrix operations and hash functions, which avoids complex signcryption structures, efficiently realizes bidirectional message communication between identity-based cryptosystems and certificateless cryptosystems.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42270931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling a stacked dense network model for outlier prediction over medical-based heart prediction data 基于医学心脏预测数据的离群值预测的堆叠密集网络模型建模
IF 0.9
Journal of High Speed Networks Pub Date : 2023-07-14 DOI: 10.3233/jhs-222079
B. R. Krishna, V. Mahalakshmi, Gopala Krishna Murthy Nookala
{"title":"Modelling a stacked dense network model for outlier prediction over medical-based heart prediction data","authors":"B. R. Krishna, V. Mahalakshmi, Gopala Krishna Murthy Nookala","doi":"10.3233/jhs-222079","DOIUrl":"https://doi.org/10.3233/jhs-222079","url":null,"abstract":"Recently, deep learning has been used in enormous successful applications, specifically considering medical applications. Especially, a huge number of data is captured through the Internet of Things (IoT) based devices related to healthcare systems. Moreover, the given captured data are real-time and unstructured. However, the existing approaches failed to reach a better accuracy rate, and the processing time needed to be lower. This work considers the medical database for accessing the patient’s record to determine the outliers over the dataset. Based on this successful analysis, a novel approach is proposed where some feasible and robust features are extracted to acquire the emotional variations for various ways of expression. Here, a novel dense-Convolutional Neural Network (CNN) with ResNet (CNN-RN) extracts features from patients’, while for establishing visual modality, deep residual network layers are used. The significance of feature extraction is less sensitive during outlier prediction while modeling the context. To handle these issues, this dense network model is used for training the network in an end-to-end manner by correlating the significance of CNN and RN of every stream and outperforming the overall approach. Here, MATLAB 2020b is used for simulation purposes, and the model outperforms various prevailing methods for consistent prediction. Some performance metrics include detection accuracy, F1-score, recall, MCC, p-value, etc. Based on this evaluation, the experimental results attained are superior to other approaches.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44937314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved design of load balancing for multipath routing protocol 改进的多径路由协议负载均衡设计
IF 0.9
Journal of High Speed Networks Pub Date : 2023-06-08 DOI: 10.3233/jhs-222063
Daqiang Liao, Du Zou, Gautam Srivastava
{"title":"Improved design of load balancing for multipath routing protocol","authors":"Daqiang Liao, Du Zou, Gautam Srivastava","doi":"10.3233/jhs-222063","DOIUrl":"https://doi.org/10.3233/jhs-222063","url":null,"abstract":"In this paper, an improved routing protocol for multipath network load balancing is proposed for defects in the traditional AOMDV (Ad hoc On-demand Multipath Distance Vector) protocol. This research work analyzes problems in traditional routing protocols and estimates the available path load according to network transmission in Wireless Mesh Networks (WMN). Moreover, we design a load distribution scheme according to a given load and improve multi-path load balancing by using the MCMR method. We also control path discovery and the number of paths while also establishing routing paths and probability balancing. Lastly, improvements are made to the AOMDV protocol and efficient data transmission is acheived. The performance results of the modified routing protocol show that the designed protocol can improve successful delivery rate and prolong network survival time.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45647754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-aware resource management approaches in software defined networks: Comprehensive analysis, opportunities and challenges 软件定义网络中的安全感知资源管理方法:综合分析、机遇与挑战
IF 0.9
Journal of High Speed Networks Pub Date : 2023-05-25 DOI: 10.3233/jhs-230004
Monire Norouzi, Zeynep Gürkas Aydin, Sefer Ergen, Mehmet Serif Bakir
{"title":"Security-aware resource management approaches in software defined networks: Comprehensive analysis, opportunities and challenges","authors":"Monire Norouzi, Zeynep Gürkas Aydin, Sefer Ergen, Mehmet Serif Bakir","doi":"10.3233/jhs-230004","DOIUrl":"https://doi.org/10.3233/jhs-230004","url":null,"abstract":"Today, with the fast growth of emerging technologies and applying numerous advantages of 5G communications, there is a critical gap between the supporting security of data transmission and resource management of Software Defined Networks (SDN). To provide a secure communication perspective for Internet of Things (IoT) devices and smart applications, network slicing in resource management is currently an important issue and is widely studied for the SDN. Due to the importance of security-aware resource management in several aspects of the SDN, this research aims to represent a new comprehensive review of existing technical classification and deep-detailed categorization of resource management approaches for SDN communications in the IoT environments. Based on each category, a technical taxonomy is presented to show a variety of security-aware platforms that include resource allocation, service composition, task scheduling, and service offloading in the IoT environments. According to the main state-of-the-art discussed comprehensive technical review, some important evaluation factors, main methodologies, advantages, and disadvantages of each case study are elaborated. Finally, some important new research directions and open challenges are presented for future scientific efforts.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"19 1","pages":"169-181"},"PeriodicalIF":0.9,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88995752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信