• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.039 seconds

Orthogonal variable spreading factor encoded unmanned aerial vehicle-assisted nonorthogonal multiple access system with hybrid physical layer security

  • Omor Faruk;Joarder Jafor Sadiqu;Kanapathippillai Cumanan;Shaikh Enayet Ullah
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.213-225
    • /
    • 2023
  • Physical layer security (PLS) can improve the security of both terrestrial and nonterrestrial wireless communication networks. This study proposes a simplified framework for nonterrestrial cyclic prefixed orthogonal variable spreading factor (OVSF)-encoded multiple-input and multiple-output nonorthogonal multiple access (NOMA) systems to ensure complete network security. Various useful methods are implemented, where both improved sine map and multiple parameter-weighted-type fractional Fourier transform encryption schemes are combined to investigate the effects of hybrid PLS. In addition, OVSF coding with power domain NOMA for multi-user interference reduction and peak-toaverage power ratio (PAPR) reduction is introduced. The performance of $\frac{1}{2}$-rated convolutional, turbo, and repeat and accumulate channel coding with regularized zero-forcing signal detection for forward error correction and improved bit error rate (BER) are also investigated. Simulation results ratify the pertinence of the proposed system in terms of PLS and BER performance improvement with reasonable PAPR.

A Study on Mobility Support in IP-based Sensor Networks (IP 기반 센서 네트워크에서 이동성 지원에 관한 연구)

  • Jung, Sung-Min;Kim, Tae-Kyung;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.736-739
    • /
    • 2011
  • IP 기반의 센서 네트워크인 6LoWPAN 은 IEEE 802.15.4 표준에 IPv6 를 적용하기 위해 제안되었다. 현재 IPv6 상에서 노드의 이동성을 지원하기 위한 기술로 MIPv6 와 PMIPv6 가 표준화 되었다. 6LoWPAN 에서 이동성을 지원하기 위해서 PMIPv6 를 적용하는 것이 MIPv6 를 적용하는 것보다 더 효율적이다. PMIPv6 기술의 특징은 기존의 MIPv6 에 비해 노드가 바인딩 메시지를 처리하지 않는 점이다. 따라서 노드의 부하를 줄일 수 있기 때문에 6LoWPAN 에 적합하다. 하지만 6LoWPAN 노드의 하드웨어적인 제약 사항을 고려해 볼 때, 기존의 PMIPv6 를 그대로 적용하기에는 무리가 있다. 그대로 적용한다면 PMIPv6 은 원 홉에 기반하고 있기 때문에 멀티 홉에 기반한 6LoWPAN 에는 적합하지 않다. 또한 기존에 정의되어 있는 RS 나 RA 메시지의 크기로 인해 멀티 홉 경로상의 각 단말에 많은 부하를 줄 수 있다. 본 논문에서는 위의 문제점을 해결하기 위해 6LoWPAN 에 적합한 RS 와 RA 메시지를 제안한다.

A Routing Method Using a Backup Cluster Head in Wireless Sensor Networks (무선 센서 네트워크에서 백업 클러스터 헤드를 이용한 라우팅 방법)

  • Lee, Seong-Ho;Bae, Jinsoo;Jo, Ji-Woo;Jung, Min-A;Kim, Yong-Geun;Jeong, Jun-Yeong;Kim, Won-Ju;Kim, Dong-Jin;Lee, Seong-Ro
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.599-601
    • /
    • 2011
  • 무선 센서 네트워크를 구성하는 센서노드들이 클러스터를 구성하고 선출된 클러스터 헤드가 클러스터 내의 센서노드들로부터 데이터를 받아서 병합한 다음, 기지국으로 데이터를 전달하는 클러스터 기반 라우팅 방법이 연구되어 왔다. 이 클러스터 기반 라우팅 방법에서 클러스터 헤드에 고장이 발생한다면, 해당 클러스터의 데이터는 기지국으로 전달할 수 없어 데이터 신뢰성에 문제가 생긴다. 이러한 문제를 해결하기 위해, 본 논문에서는 고장감내를 지원하는 클러스터 기반 라우팅 방법을 제안한다. 제안한 방법은 각 클러스터마다 백업 클러스터 헤드를 지정하여 원래의 클러스터 헤드에 고장이 발생한다면 백업 클러스터 헤드가 그 역할을 대신하도록 함으로써 데이터 전달의 신뢰성을 보장한다.

Prediction of California bearing ratio (CBR) for coarse- and fine-grained soils using the GMDH-model

  • Mintae Kim;Seyma Ordu;Ozkan Arslan;Junyoung Ko
    • Geomechanics and Engineering
    • /
    • v.33 no.2
    • /
    • pp.183-194
    • /
    • 2023
  • This study presents the prediction of the California bearing ratio (CBR) of coarse- and fine-grained soils using artificial intelligence technology. The group method of data handling (GMDH) algorithm, an artificial neural network-based model, was used in the prediction of the CBR values. In the design of the prediction models, various combinations of independent input variables for both coarse- and fine-grained soils have been used. The results obtained from the designed GMDH-type neural networks (GMDH-type NN) were compared with other regression models, such as linear, support vector, and multilayer perception regression methods. The performance of models was evaluated with a regression coefficient (R2), root-mean-square error (RMSE), and mean absolute error (MAE). The results showed that GMDH-type NN algorithm had higher performance than other regression methods in the prediction of CBR value for coarse- and fine-grained soils. The GMDH model had an R2 of 0.938, RMSE of 1.87, and MAE of 1.48 for the input variables {G, S, and MDD} in coarse-grained soils. For fine-grained soils, it had an R2 of 0.829, RMSE of 3.02, and MAE of 2.40, when using the input variables {LL, PI, MDD, and OMC}. The performance evaluations revealed that the GMDH-type NN models were effective in predicting CBR values of both coarse- and fine-grained soils.

IEEE 802.15.4e TSCH-mode Scheduling in Wireless Communication Networks

  • Ines Hosni;Ourida Ben boubaker
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.156-165
    • /
    • 2023
  • IEEE 802.15.4e-TSCH is recognized as a wireless industrial sensor network standard used in IoT systems. To ensure both power savings and reliable communications, the TSCH standard uses techniques including channel hopping and bandwidth reserve. In TSCH mode, scheduling is crucial because it allows sensor nodes to select when data should be delivered or received. Because a wide range of applications may necessitate energy economy and transmission dependability, we present a distributed approach that uses a cluster tree topology to forecast scheduling requirements for the following slotframe, concentrating on the Poisson model. The proposed Optimized Minimal Scheduling Function (OMSF) is interested in the details of the scheduling time intervals, something that was not supported by the Minimal Scheduling Function (MSF) proposed by the 6TSCH group. Our contribution helps to deduce the number of cells needed in the following slotframe by reducing the number of negotiation operations between the pairs of nodes in each cluster to settle on a schedule. As a result, the cluster tree network's error rate, traffic load, latency, and queue size have all decreased.

A Case Study of Creative Art Based on AI Generation Technology

  • Qianqian Jiang;Jeanhun Chung
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.84-89
    • /
    • 2023
  • In recent years, with the breakthrough of Artificial Intelligence (AI) technology in deep learning algorithms such as Generative Adversarial Networks (GANs) and Variational Autoencoders (VAE), AI generation technology has rapidly expanded in various sub-sectors in the art field. 2022 as the explosive year of AI-generated art, especially in the creation of AI-generated art creative design, many excellent works have been born, which has improved the work efficiency of art design. This study analyzed the application design characteristics of AI generation technology in two sub fields of artistic creative design of AI painting and AI animation production , and compares the differences between traditional painting and AI painting in the field of painting. Through the research of this paper, the advantages and problems in the process of AI creative design are summarized. Although AI art designs are affected by technical limitations, there are still flaws in artworks and practical problems such as copyright and income, but it provides a strong technical guarantee in the expansion of subdivisions of artistic innovation and technology integration, and has extremely high research value.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

Network Traffic Measurement Analysis using Machine Learning

  • Hae-Duck Joshua Jeong
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.19-27
    • /
    • 2023
  • In recent times, an exponential increase in Internet traffic has been observed as a result of advancing development of the Internet of Things, mobile networks with sensors, and communication functions within various devices. Further, the COVID-19 pandemic has inevitably led to an explosion of social network traffic. Within this context, considerable attention has been drawn to research on network traffic analysis based on machine learning. In this paper, we design and develop a new machine learning framework for network traffic analysis whereby normal and abnormal traffic is distinguished from one another. To achieve this, we combine together well-known machine learning algorithms and network traffic analysis techniques. Using one of the most widely used datasets KDD CUP'99 in the Weka and Apache Spark environments, we compare and investigate results obtained from time series type analysis of various aspects including malicious codes, feature extraction, data formalization, network traffic measurement tool implementation. Experimental analysis showed that while both the logistic regression and the support vector machine algorithm were excellent for performance evaluation, among these, the logistic regression algorithm performs better. The quantitative analysis results of our proposed machine learning framework show that this approach is reliable and practical, and the performance of the proposed system and another paper is compared and analyzed. In addition, we determined that the framework developed in the Apache Spark environment exhibits a much faster processing speed in the Spark environment than in Weka as there are more datasets used to create and classify machine learning models.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

Vulnerability Attack for Mutual Password Authentication Scheme with Session Key agreement (세션 키 동의를 제공하는 상호인증 패스워드 인증 스킴에 대한 취약점 공격)

  • Seo Han Na;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.179-188
    • /
    • 2022
  • Password authentication schemes (PAS) are the most common mechanisms used to ensure secure communication in open networks. Mathematical-based cryptographic authentication schemes such as factorization and discrete logarithms have been proposed and provided strong security features, but they have the disadvantage of high computational and message transmission costs required to construct passwords. Fairuz et al. therefore argued for an improved cryptographic authentication scheme based on two difficult fixed issues related to session key consent using the smart card scheme. However, in this paper, we have made clear through security analysis that Fairuz et al.'s protocol has security holes for Privileged Insider Attack, Lack of Perfect Forward Secrecy, Lack of User Anonymity, DoS Attack, Off-line Password Guessing Attack.