DETERMINATION OF MINIMUM NUMBER OF UAVS FOR LOCAL AREA NETWORKS OF DRONES
Sandaruvan Rajasinghege and Rohan de Silva School of Engineering and Technology, CQUniversity, Australia
There are many applications of Unmanned Aerial Vehicle (UAV) networks where all UAVs belong to one organization or a person. In such applications, the number of UAVs that can be employed is limited due to the cost factor. Local Area Networks of Drones (LoDs) have been introduced recently for such purposes. This paper presents methods of determining the minimum number of UAVs to perform tasks in four basic categories of LoD applications: completing a single task at a time, completing multiple tasks simultaneously, monitoring the entire area using a single UAV branch and monitoring the entire area simultaneously using multiple branches of UAVs. Completing one task at a time always requires a minimum number of UAVs and increasing the number of simultaneous tasks performed always increases the number of UAVs required for any application.
LoDs, UAV Networks, Minimum number of Drones
For More Details :
https://aircconline.com/ijcnc/V12N4/12420cnc01.pdf
Volume Link:
http://airccse.org/journal/ijc2020.html
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS WITH ROADSIDE UNIT INFRASTRUCTURE IN A VEHICULAR AD HOC NETWORK
Safae Smiri, Abdelali Boushaba, Rachid Ben Abbou and Azeddine Zahi, Sidi Mohamed Ben Abdelah University, Fez, Morocco
Vehicular ad-hoc networks (VANETs) represent a powerful and active field of research and have given rise to many challenges related to routing protocols and communication problems with other vehicles or fixed infrastructure called roadside units (RSU). The dynamic topology and the obstacles encountered in VANET environments mean that the routing of data and the communication between vehicles is confronted with many problems, and particularly in vehicular applications that require reliable communication and satisfactory quality of service (QoS). This paper promotes the intention of infrastructure in an urban scenario and studies the performance of routing protocols considering the constraint of mobility. This leads us to analyze a wide range of routing protocols to ensure optimal coverage and continuous connectivity, taking into consideration two types of data traffic in realistic environments that depend on certain performance metrics. The paper also investigates which protocols provide better performance with RSUs by ranking the results for QoS.
VANET, Intelligent Transportation System (ITS); Routing protocols, Roadside unit (RSU), Urban topology, NS-2, VanetMobiSim, Quality of service (QoS).
For More Details :
http://aircconline.com/ijcnc/V12N4/12420cnc02.pdf
Volume Link:
http://airccse.org/journal/ijc2020.html
MULTI-CRITERIA HANDOVER DECISION FOR HETEROGENEOUS NETWORKS: CARRIER AGGREGATION DEPLOYMENT SCENARIO
Maryam Abdulazeez- Ahmed, Nor Kamariah Nordin, Aduwati Bint Sali and Fazirulhisyam Hashim, Universiti Putra Malaysia, Selangor Malaysia
Carrier aggregation and integration of heterogeneous networks allow the mobile user equipment to benefit from wider bandwidth and radio coverage of different access technologies. However, these technologies have increased handoff scenario probability through user equipment’s mobility, leading to high outage probability and low throughput. Handover is an important aspect of mobility management which allows users to migrate from one cell to another without losing connections. But no lone access technology meets the requirements of providing seamless communication without loss and delay. Therefore, high-quality service continuity and reliable user equipment access to network anywhere and at any time require the design of an appropriate handover decision algorithm. In this paper, a multi-criteria based handover decision-making algorithm is proposed to evade loss of communication and provide better performance to the system. It adaptively makes handover decisions based on different decision criteria (load, availability of resources, and the handover scenario type) in addition to signal interference to noise ratio. The multi-criteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. As compared to some existing handover decision algorithms, simulation result shows that this algorithm improves system performance in terms of handover failure by 93%, 72%, and 58%; radio link failure reduction by 77%, 43%, and 22%; and handover ping–pong by 81%, 59%, and 36% over the conventional received signal strength, received wireless transmission line, and multi-influence factor hand over decisions respectively.
Carrier aggregation, handover decision, user equipment, heterogeneous network, Long Time Evolution-Advanced, multi-criteria, signal-to-interference-plus-noise-ratio, interference-to-interference-plus-noise-ratio
For More Details :
http://aircconline.com/ijcnc/V12N4/12420cnc03.pdf
Volume Link:
http://airccse.org/journal/ijc2020.html
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS NETWORKS
Minh NguyenHieu1 , BacDoThi2 , Canh HoangNgoc3 , Manh TranCong4 , Phan DuongPhuc5 and Khoa Nguyen Tuan6 1Institute of Cryptographic Science and Technology, Hanoi, Vietnam 2Le Quy Don Technical University, Hanoi, Vietnam 3Thuongmai University, Hanoi, Vietnam 4Thai Nguyen University of Information and Communication Technology, Thainguyen, Vietnam 5Academy of Cryptography Techniques, Hanoi, Vietnam 6Research Laboratories of Saigon High-Tech Park, Ho Chi Minh City, Vietnam
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
Controlled substitution–permutation network (CSPN), Switchable Data Dependent Operation (SDDO), Block cipher, Hybrid model, Field-programmable gate array (FPGA).
For More Details :
http://aircconline.com/ijcnc/V12N4/12420cnc04.pdf
Volume Link:
http://airccse.org/journal/ijc2020.html
ROBOTIC INNER SIGNAL PROPAGATION AND RANDOM ACCESS OVER HYBRID ACCESS SCHEME
Md. Abir Hossain, Zhenni Pan, Megumi Saito, Jiang Liu and Shigeru Shimamoto, Waseda University, Japan
This paper proposes a Hybrid Access Scheme (HAS) aiming to convert a future robot’s backend communication system by a finite number of sensors instead of using a lot of wires. To replace this communication, the HAS needs to assure higher reliability within stringent low latency packet transmission. In this paper, the HAS utilizes the packet diversity principle and forward multiple copies of the same packet over the massive number of subcarrier channels. The HAS assigns the random accessing to select a subcarrier channel for general packet transmitting sensors. The audio and video sensors transmit packets over the dedicated channels to avoid collisions. The HAS system allows transmitting audio, video and general sensors simultaneously. The minimum number of subcarriers to satisfy the URLLC reliability requirement of 99.999% is evaluated for different packet duplications over different arrival condition.The HAS system’s reliability and collision probability are evaluated in MATLAB simulator for different packet duplication over different arrival condition. Moreover, the signal propagation expressions are captured using ANSYS HFSS software for rectangular and circular transmission medium over the 900 MHz, 2.4 GHz, 24 GHz, and 55 GHz frequency bands for different structural configurations.
Hybrid Access Scheme, Signal Propagation, Random Access, reliability, URLLC
For More Details :
https://aircconline.com/ijcnc/V12N4/12420cnc05.pdf
Volume Link:
http://airccse.org/journal/ijc2020.html
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
Mohammad Alreshoodi, Qassim University, Qassim, Saudi Arabia
Internet of Things (IoT) deployments mostly relies on the establishment of Low-Power and Lossy Networks (LLNs) among a large number of constraint devices. The Internet Engineering Task Force (IETF) provides an effective IPv6-based LLN routing protocol, namely the IPv6 Routing Protocol for Low Power and Lossy Network (RPL). RPL provides adequate protection against external security attacks but stays vulnerable to internal routing attacks such as a rank attack. Malicious RPL nodes can carry out a rank attack in different forms and cause serious network performance degradation. An experimental study of the impact of the decreased rank attack on the overall network performance is presented in this paper. In also besides, it is important to understand the main influencing factors in this context. In this study, several some many network scenarios were considered with varying network sizes, attacker properties, and topological setups. The experimental results indicate a noticeable adverse effect of the rank attack on the average PDR, delay, ETX, and beacon interval. However, such impact was varied according to network size, attacker position, attacker neighbor count, number of attack-affected nodes, and overall hops increase. The results give a practical reference to the overall performance of RPL networks under rank attacks.
Security; Routing Attack; RPL; Routing Protocols; Internet of Things.
For More Details :
https://aircconline.com/ijcnc/V12N4/12420cnc06.pdf
Volume Link:
http://airccse.org/journal/ijc2020.html
ANALYTIC HIERARCHY PROCESS-BASED FUZZY MEASUREMENT TO QUANTIFY VULNERABILITIES OF WEB APPLICATIONS
Mohammad Shojaeshafiei1, Letha Etzkorn1 and Michael Anderson2, 1,2,The University of Alabama in Huntsville, Huntsville, USA
Much research has been conducted to detect vulnerabilities of Web Applications; however, these never proposed a methodology to measure the vulnerabilities either qualitatively or quantitatively. In this paper, a methodology is proposed to investigate the quantification of vulnerabilities in Web Applications. We applied the Goal Question Metrics (GQM) methodology to determine all possible security factors and sub factors of Web Applications in the Department of Transportation (DOT) as our proof of concept. Then we introduced a Multi-layered Fuzzy Logic (MFL) approach based on the security sub-factors’ prioritization in the Analytic Hierarchy Process (AHP). Using AHP, we weighted each security sub-factor before the quantification process in the Fuzzy Logic to handle imprecise crisp number calculation.
Vulnerability, web applications, analytic hierarchy process, fuzzy logic, goal question metrics, cybersecurity
For More Details :
https://aircconline.com/csit/papers/vol9/csit90901.pdf
Volume Link:
: http://airccse.org/journal/ijc2020.html
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
Siti Rahayu Selamat1, Teh Teck Guan2 and Robiah Yusof1 1, Universiti Teknikal Malaysia Melaka, Malaysia 2<.>Infineon Technologies Melaka, Batu Berendam, Malaysia
Current password authentication system was proven not secure enough to protect the information from intruders. However, various research has been done and the results show the value of FRR still low and the value of FAR still high. Thus, one of the methods suggests, is enhancing the current system using keystroke dynamics. Keystroke dynamics is a type of biometric authentication that does not require any special hardware, easy to use as the same routine as normal password authentication. Therefore, this research proposed an authentication system using keystroke dynamics to prevent the system from intruders. A system is developed that consist of two parts which are enrolment and verification. Then, a prototype is developed for testing process that consists of 3 main modules, namely Enrolment, Client/Server Connection and, Verification and Retraining. Based on the testing, the system proved that the keystroke dynamic authentication system was able to implement in client/server environment and shows the value of EER is low that indicates it provide a better system authentication. In future, the system can be improved by enhancing the security, performance, and user interface.
Authentication, Web-based, Biometric, Keystroke Dynamics.
For More Details :
https://aircconline.com/ijnsa/V12N4/12420ijnsa01.pdf
Volume Link:
http://airccse.org/journal/jnsa20_current.html
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION CAPABILITY OF INTRUSION PROTECTION SYSTEMS
Hajar Elkassabi, Mohammed Ashour and Fayez Zaki , Mansoura University, Mansoura, Egypt
Over the past few years, intrusion protection systems have drawn a mature research area in the field of computer networks. The problem of excessive features has a significant impact on intrusion detection performance. The use of machine learning algorithms in many previous researches has been used to identify network traffic, harmful or normal. Therefore, to obtain the accuracy, we must reduce the dimensionality of the data used. A new model design based on a combination of feature selection and machine learning algorithms is proposed in this paper. This model depends on selected genes from every feature to increase the accuracy of intrusion detection systems. We selected from features content only ones which impact in attack detection. The performance has been evaluated based on a comparison of several known algorithms. The NSL-KDD dataset is used for examining classification. The proposed model outperformed the other learning approaches with accuracy 98.8 %.
NSL-KDD, Machine Learning, Intrusion Detection Systems, Classification, Feature Selection.
For More Details :
https://aircconline.com/ijnsa/V12N4/12420ijnsa02.pdf
Volume Link:
http://airccse.org/journal/jnsa20_current.html
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUTING: PANACEA FOR MULTI-CLOUD SECURITY SNAGS
Uchechukwu Emejeamara1, Udochukwu Nwoduh2 and Andrew Madu2 1IEEE Computer Society, Connecticut Section, USA 2Federal Polytechnic Nekede, Nigeria.
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
Multi-Cloud, CSP, Vendor Lock-in, Cyber-crime & BDI.
For More Details :
https://aircconline.com/ijnsa/V12N4/12420ijnsa03.pdf
Volume Link:
http://airccse.org/journal/jnsa20_current.html