International Journal of Communication Networks and Information Security

Displaying 1-39 of 39 results

  • White Papers // Aug 2014

    On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey

    A Medium Access Control (MAC) protocol has direct impact on the energy efficiency and traffic characteristics of any Wireless Sensor Network (WSN). Due to the inherent differences in WSN's requirements and application scenarios, different kinds of MAC protocols have so far been designed especially targeted to WSNs, though the primary...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    A Comprehensive Review of Distributed Coding Algorithms for Visual Sensor Network (VSN)

    Since the invention of low cost camera, it has been widely incorporated into the sensor node in Wireless Sensor Network (WSN) to create the Visual Sensor Network (VSN). Nevertheless, the usage of the camera is bringing with it a lot of new challenges, because all the sensor nodes are powered...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    Effects of ASE Noise and Dispersion Chromatic on Performance of DWDM Networks Using Distributed Raman Amplifiers

    In this paper, the authors investigate effects of Amplified Spontaneous Emission noise (ASE), Noise Figure (NF) and dispersion chromatic on the performance of DWDM networks using Distributed optical fiber Raman Amplifiers (DRAs) in two different pump configurations, i.e., forward and backward pumping. They found that the pumping configurations, ASE noise,...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    Capacity Dimensioning of HSDPA Urban Network

    Capacity dimensioning is performed before launching a cellular network, which includes coverage estimation and forecast of throughput. Cellular companies are only providing 2G services, while 3G services are still in process of being launched. Although a lot of research has been done on 3G services in developed countries but there...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    Overhead-Controlled Contention-Based Routing for VANETs

    Routing of Vehicular Ad hoc NETworks (VANETs) is a challenging issue that has attracted many attentions of researchers recently. Contention based routing protocols have good congruity with high mobility of nodes in this kind of networks. Prevention from forwarding duplicate packets is an important challenge in such routing protocols. Indeed,...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), clustering plays a very important role for energy savings at each node because it reduces the number of transmissions through TDMA based communication. For secure clustering, it is very crucial to find compromised nodes and remove them during the initial cluster formation process. If some...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    The use of Radio Frequency IDentification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or Mobile Ad hoc NETworks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    QoS-VNS-CS: QoS Constraints Core Selection Algorithm Based on Variable Neighborhood Search Algorithm

    Within the development of network multimedia technology, more and more real-time multimedia applications arrive with the need to transmit information using multicast communication. Multicast IP routing is an important topic, covering both theoretical and practical interest in different networks layers. In network layer, there are several multicast routing protocols using...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Optimal Spectrum Sensing Threshold for Unequal Priors Case

    Classical spectrum sensing techniques utilize Maximum Likelihood (ML) detection for identification of spectrum holes. The approach is sub-optimal for the case of un-equal priors where the probabilities of channel occupation and vacancy are not the same. Such situations are bound to occur in most commercial bands such as GSM etc...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Improved Sensing Accuracy Using Enhanced Energy Detection Algorithm With Secondary User Cooperation in Cognitive Radios

    Spectrum sensing is indispensable for cognitive radio to identify the available white spaces. Energy detection is considered as a preferred technique for spectrum sensing in cognitive radio networks. It is because of its simplicity, applicability and low computational complexity, energy detection is employed widely for spectrum sensing. This paper proposes...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Predictive Preemptive Certificate Transfer in Cluster-Based Certificate Chain

    Mobile Ad hoc NETworks (MANETs) are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in MANETs is a very important issue and it is hard to use conventional security techniques. Many...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks

    In recent years, multi-channel multi-radio wireless mesh networks are considered a reliable and cost effective way for internet access in wide area. A major research challenge in this network is, selecting a least interference channel from the available channels, efficiently assigning a radio to the selected channel, and routing packets...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular-Femtocell Networks

    Cognitive radio and femtocell are promising technologies which can satisfy the requirements of future mobile communications in terms of dynamic spectrum sharing and high user density areas. Providing Quality-of-Service (QoS) guaranteed real-time services is challenging issue of future cognitive cellular femtocell mobile networks. In this paper, the authors introduce a...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks

    Popularity of Wireless Sensor Networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Design and Implementation of ID Based MANET Auto-Configuration Protocol

    Auto-configuration protocols are used for assignment of unique IP addresses to nodes in Mobile Ad hoc NETworks (MANET). Without the assignment of unique IP addresses, service provisioning between the nodes is not possible. Such protocols use various heuristics to ensure the uniqueness in IP address assignment; such aspects increase the...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    A Geometric Distribution for Backoff Time in IEEE 802.11 DCF: An Analytical Study

    Today's networks, including WLANs, transport different classes of services. A service differentiation is then essential to provide Quality of Service (QoS). However, IEEE 802.11 for WLANs was primarily designed for best effort traffic and did not provide QoS specifications. IEEE 802.11e MAC has been then described to support QoS in...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Link Quality and MAC-Overhead Aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad Hoc Networks

    In Ad Hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure that occurs with the less received power. However, these approaches encounter some difficulties,...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks

    Data dissemination is the most significant task in a Wireless Sensor Network (WSN). From the bootstrapping stage to the full functioning stage, a WSN must disseminate data in various patterns like from the sink to node, from node to sink, from node to node, or the like. This is what...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies

    In today's world, web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Secure Method for Authenticity Verification of Handwritten Signatures through Digital Image Processing and Artificial Neural Networks

    This paper aims to propose a method to do authenticity verification of handwritten signatures based on the use of digital image processing and artificial neural networks techniques through the back propagation learning algorithm with 500 and 901 approaches, in order to optimize this verification process and act as a decision...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks

    The idea of Cognitive Radio (CR) is to share the spectrum between a user called primary, and a user called secondary. Dynamic Spectrum Access (DSA) is a new spectrum sharing paradigm in cognitive radio that allows secondary users to access the abundant spectrum holes in the licensed spectrum bands. DSA...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2013

    A Survey on the Communication Protocols and Security in Cognitive Radio Networks

    A Cognitive Radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network

    A Mobile Ad-hoc NETwork (MANET) is different from other wireless networks in many ways. One of the key differences is that a MANET is a multi-hop wireless network,i.e., a routing path is composed of intermediate mobile nodes and wireless links connecting them. In this paper, Heterogeneous Mobile Ad-hoc NETworks (H-MANETs)...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks

    Proxy Mobile IPv6 (PMIPv6) was proposed by the Internet Engineering Task Force (IETF) as a new network-based mobility protocol which does not require the involvement of MN's in any form of mobility management. MN can handover relatively faster in PMIPv6 than in host-based mobility protocols (e.g. Mobile IPv6 (MIPv6)) because...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks

    The high-level contributions of this paper are the design and development of two distributed spanning tree-based data gathering algorithms for wireless mobile sensor networks and their exhaustive simulation study to investigate a complex stability vs. node-network lifetime trade off that has been hitherto not explored in the literature. The topology...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks

    The future wireless communication systems demand very high data rates, anti-jamming ability and multiuser support. People want large amount of data to be continuously accessible in their personal devices. Direct Sequence (DS) spread spectrum based techniques such as Code Division Multiple Access (CDMA) fulfil these requirements but, at the same...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Self-Organized Disjoint Service Placement in Future Mobile Communication Networks

    Future mobile communication networks will offer many ubiquitous services to its clients such as voice and video communication, access to data and files, use of virtual resources in cloud, etc. The provision of these services in face of the different challenges posed by future wireless networks such as changing network...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Process Aware Host-Based Intrusion Detection Model

    Now-a-days, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2012

    QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks

    Providing Quality of Service (QoS) support in Mobile Ad Hoc NETworks (MANETs) is a particularly active research area with a number of proposals being made to support real-time applications that are based upon the interaction between the routing scheme and a QoS provisioning mechanism. This paper builds upon such ideas...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Sep 2010

    Guard Channel Based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks

    Call Admission Control (CAC) strategies are required to guarantee all service types meet their Quality of Service (QoS) requirements in wireless broadband mobile networks. Although much research focuses on modified Mobile IP to get better efficient performance, there are few papers to discuss admission control when considering handover and mobility...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Asynchronous Networks and Erlang Formulas

    The paper addresses the idea of utilization of Erlang formulas in asynchronous ATM and IP networks. Based on the common properties of synchronous and asynchronous networks the authors have proposed the utilization of Erlang formulas not only for synchronous networks, but also for asynchronous networks. It is possible to describe...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    QoS Provisioning in Three Layer MIPv6 Architecture Using RSVP

    The goal of mobile IP based architecture is to provide seamless mobility with minimized handoff latency, signaling overhead and tunneling cost. There are many research work proposed to support such seamless mobility. Most of the proposals suggest hierarchical arrangement of anchor agents to support minimized handoff latency and signaling cost....

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Broadband Cognitive Radio Transmission Based on Sub-Channel Sensing and NC-OFDM

    Cognitive Radio (CR) has now been applied for broadband communication systems, so its spectrum sensing technique should be in a broadband signal detection framework. Conventional sensing algorithms such as energy detection are only effective for narrow-band signals or a single broadband signal in the detection range of the spectrum. In...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Mesh Networks Planning: Optimization With Multi-Hop Interference

    Mesh network planning is a difficult topic to deal with. Due to the high redundancy in this type of networks, the complexity of planning such networks is greatly increased, comparing to traditional point-to-multi-point networks. In this paper, the authors have developed an optimization algorithm to perform the planning of a...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Overview of Optical Local Access Networks Development and Design Challenges

    Local access network technologies tend to take advantage of the potentially huge capabilities of fiber communication to deliver faster and more various services to end users. There has been considerable research effort in implementing access networks optically. These optical access technologies were developed particularly under certain circumstances, each of which...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN

    A Wireless Sensor Network is composed of hundreds or thousands of nodes that can be equipped with limited energy resources, but can still be used over an extensive set of diverse applications such as environment monitoring, healthcare, homeland security, military surveillance, manufacturing, and industry automation. The physical layer parameter affects...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Worm Spreading and Patching in Inter-Vehicle Communications

    Inter-Vehicle Communications (IVC) rely on frequent data exchange among vehicles to facilitate road safety, congestion control, route planning, etc. The wireless connectivity among vehicles unfortunately poses a challenge for securing large-scale deployment of IVC systems. To successfully mitigate threats such as worm spreading in IVC systems, the authors describe the...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for GSM/ UMTS/WLAN Operations

    In this paper, two single rectangular patch antennas with a slot are designed and analyzed theoretically from the concept of multi-cavity structure. The theoretical return loss parameters of the antenna electrical characteristics are in good concordance with the Advanced Design System (ADS) simulation. Two patch antennas with rectangular slot are...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2009

    Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments

    Wireless Local Area Networks (WLANs) are providing the most economical means of Internet access. However, their access is very much limited. They can be deployed in a large scale by integrating them with cellular networks such as Universal Mobile Telecommunication System (UMTS); General Packet Radio Services (GPRS) etc. A seamless...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network

    A Mobile Ad-hoc NETwork (MANET) is different from other wireless networks in many ways. One of the key differences is that a MANET is a multi-hop wireless network,i.e., a routing path is composed of intermediate mobile nodes and wireless links connecting them. In this paper, Heterogeneous Mobile Ad-hoc NETworks (H-MANETs)...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks

    Proxy Mobile IPv6 (PMIPv6) was proposed by the Internet Engineering Task Force (IETF) as a new network-based mobility protocol which does not require the involvement of MN's in any form of mobility management. MN can handover relatively faster in PMIPv6 than in host-based mobility protocols (e.g. Mobile IPv6 (MIPv6)) because...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks

    The high-level contributions of this paper are the design and development of two distributed spanning tree-based data gathering algorithms for wireless mobile sensor networks and their exhaustive simulation study to investigate a complex stability vs. node-network lifetime trade off that has been hitherto not explored in the literature. The topology...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2012

    QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks

    Providing Quality of Service (QoS) support in Mobile Ad Hoc NETworks (MANETs) is a particularly active research area with a number of proposals being made to support real-time applications that are based upon the interaction between the routing scheme and a QoS provisioning mechanism. This paper builds upon such ideas...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2009

    Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments

    Wireless Local Area Networks (WLANs) are providing the most economical means of Internet access. However, their access is very much limited. They can be deployed in a large scale by integrating them with cellular networks such as Universal Mobile Telecommunication System (UMTS); General Packet Radio Services (GPRS) etc. A seamless...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Self-Organized Disjoint Service Placement in Future Mobile Communication Networks

    Future mobile communication networks will offer many ubiquitous services to its clients such as voice and video communication, access to data and files, use of virtual resources in cloud, etc. The provision of these services in face of the different challenges posed by future wireless networks such as changing network...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks

    The future wireless communication systems demand very high data rates, anti-jamming ability and multiuser support. People want large amount of data to be continuously accessible in their personal devices. Direct Sequence (DS) spread spectrum based techniques such as Code Division Multiple Access (CDMA) fulfil these requirements but, at the same...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Overview of Optical Local Access Networks Development and Design Challenges

    Local access network technologies tend to take advantage of the potentially huge capabilities of fiber communication to deliver faster and more various services to end users. There has been considerable research effort in implementing access networks optically. These optical access technologies were developed particularly under certain circumstances, each of which...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Sep 2010

    Guard Channel Based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks

    Call Admission Control (CAC) strategies are required to guarantee all service types meet their Quality of Service (QoS) requirements in wireless broadband mobile networks. Although much research focuses on modified Mobile IP to get better efficient performance, there are few papers to discuss admission control when considering handover and mobility...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Asynchronous Networks and Erlang Formulas

    The paper addresses the idea of utilization of Erlang formulas in asynchronous ATM and IP networks. Based on the common properties of synchronous and asynchronous networks the authors have proposed the utilization of Erlang formulas not only for synchronous networks, but also for asynchronous networks. It is possible to describe...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    QoS Provisioning in Three Layer MIPv6 Architecture Using RSVP

    The goal of mobile IP based architecture is to provide seamless mobility with minimized handoff latency, signaling overhead and tunneling cost. There are many research work proposed to support such seamless mobility. Most of the proposals suggest hierarchical arrangement of anchor agents to support minimized handoff latency and signaling cost....

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Broadband Cognitive Radio Transmission Based on Sub-Channel Sensing and NC-OFDM

    Cognitive Radio (CR) has now been applied for broadband communication systems, so its spectrum sensing technique should be in a broadband signal detection framework. Conventional sensing algorithms such as energy detection are only effective for narrow-band signals or a single broadband signal in the detection range of the spectrum. In...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Mesh Networks Planning: Optimization With Multi-Hop Interference

    Mesh network planning is a difficult topic to deal with. Due to the high redundancy in this type of networks, the complexity of planning such networks is greatly increased, comparing to traditional point-to-multi-point networks. In this paper, the authors have developed an optimization algorithm to perform the planning of a...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN

    A Wireless Sensor Network is composed of hundreds or thousands of nodes that can be equipped with limited energy resources, but can still be used over an extensive set of diverse applications such as environment monitoring, healthcare, homeland security, military surveillance, manufacturing, and industry automation. The physical layer parameter affects...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Worm Spreading and Patching in Inter-Vehicle Communications

    Inter-Vehicle Communications (IVC) rely on frequent data exchange among vehicles to facilitate road safety, congestion control, route planning, etc. The wireless connectivity among vehicles unfortunately poses a challenge for securing large-scale deployment of IVC systems. To successfully mitigate threats such as worm spreading in IVC systems, the authors describe the...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for GSM/ UMTS/WLAN Operations

    In this paper, two single rectangular patch antennas with a slot are designed and analyzed theoretically from the concept of multi-cavity structure. The theoretical return loss parameters of the antenna electrical characteristics are in good concordance with the Advanced Design System (ADS) simulation. Two patch antennas with rectangular slot are...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies

    In today's world, web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Process Aware Host-Based Intrusion Detection Model

    Now-a-days, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2013

    A Survey on the Communication Protocols and Security in Cognitive Radio Networks

    A Cognitive Radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks

    Popularity of Wireless Sensor Networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Secure Method for Authenticity Verification of Handwritten Signatures through Digital Image Processing and Artificial Neural Networks

    This paper aims to propose a method to do authenticity verification of handwritten signatures based on the use of digital image processing and artificial neural networks techniques through the back propagation learning algorithm with 500 and 901 approaches, in order to optimize this verification process and act as a decision...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Securing Cluster Formation and Cluster Head Elections in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), clustering plays a very important role for energy savings at each node because it reduces the number of transmissions through TDMA based communication. For secure clustering, it is very crucial to find compromised nodes and remove them during the initial cluster formation process. If some...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

    The use of Radio Frequency IDentification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. As expected, applications based on sensor networks, ad-hoc or Mobile Ad hoc NETworks (MANETs) can be highly benefited from the adoption of RFID solutions. There is a strong need to employ lightweight...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Design and Implementation of ID Based MANET Auto-Configuration Protocol

    Auto-configuration protocols are used for assignment of unique IP addresses to nodes in Mobile Ad hoc NETworks (MANET). Without the assignment of unique IP addresses, service provisioning between the nodes is not possible. Such protocols use various heuristics to ensure the uniqueness in IP address assignment; such aspects increase the...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    A Geometric Distribution for Backoff Time in IEEE 802.11 DCF: An Analytical Study

    Today's networks, including WLANs, transport different classes of services. A service differentiation is then essential to provide Quality of Service (QoS). However, IEEE 802.11 for WLANs was primarily designed for best effort traffic and did not provide QoS specifications. IEEE 802.11e MAC has been then described to support QoS in...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Link Quality and MAC-Overhead Aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad Hoc Networks

    In Ad Hoc networks, route failure may occur due to less received power, mobility, congestion and node failures. Many approaches have been proposed in literature to solve this problem, where a node predicts pre-emptively the route failure that occurs with the less received power. However, these approaches encounter some difficulties,...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks

    Data dissemination is the most significant task in a Wireless Sensor Network (WSN). From the bootstrapping stage to the full functioning stage, a WSN must disseminate data in various patterns like from the sink to node, from node to sink, from node to node, or the like. This is what...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Survey on Dynamic Spectrum Access Techniques in Cognitive Radio Networks

    The idea of Cognitive Radio (CR) is to share the spectrum between a user called primary, and a user called secondary. Dynamic Spectrum Access (DSA) is a new spectrum sharing paradigm in cognitive radio that allows secondary users to access the abundant spectrum holes in the licensed spectrum bands. DSA...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey

    A Medium Access Control (MAC) protocol has direct impact on the energy efficiency and traffic characteristics of any Wireless Sensor Network (WSN). Due to the inherent differences in WSN's requirements and application scenarios, different kinds of MAC protocols have so far been designed especially targeted to WSNs, though the primary...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    A Comprehensive Review of Distributed Coding Algorithms for Visual Sensor Network (VSN)

    Since the invention of low cost camera, it has been widely incorporated into the sensor node in Wireless Sensor Network (WSN) to create the Visual Sensor Network (VSN). Nevertheless, the usage of the camera is bringing with it a lot of new challenges, because all the sensor nodes are powered...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    QoS-VNS-CS: QoS Constraints Core Selection Algorithm Based on Variable Neighborhood Search Algorithm

    Within the development of network multimedia technology, more and more real-time multimedia applications arrive with the need to transmit information using multicast communication. Multicast IP routing is an important topic, covering both theoretical and practical interest in different networks layers. In network layer, there are several multicast routing protocols using...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Optimal Spectrum Sensing Threshold for Unequal Priors Case

    Classical spectrum sensing techniques utilize Maximum Likelihood (ML) detection for identification of spectrum holes. The approach is sub-optimal for the case of un-equal priors where the probabilities of channel occupation and vacancy are not the same. Such situations are bound to occur in most commercial bands such as GSM etc...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Improved Sensing Accuracy Using Enhanced Energy Detection Algorithm With Secondary User Cooperation in Cognitive Radios

    Spectrum sensing is indispensable for cognitive radio to identify the available white spaces. Energy detection is considered as a preferred technique for spectrum sensing in cognitive radio networks. It is because of its simplicity, applicability and low computational complexity, energy detection is employed widely for spectrum sensing. This paper proposes...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Predictive Preemptive Certificate Transfer in Cluster-Based Certificate Chain

    Mobile Ad hoc NETworks (MANETs) are a set of nodes that cooperate and communicate wirelessly. This kind of networks in easy to deploy because there is no need of any pre-existing infrastructure. Security in MANETs is a very important issue and it is hard to use conventional security techniques. Many...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    An Efficient Interference Aware Partially Overlapping Channel Assignment and Routing in Wireless Mesh Networks

    In recent years, multi-channel multi-radio wireless mesh networks are considered a reliable and cost effective way for internet access in wide area. A major research challenge in this network is, selecting a least interference channel from the available channels, efficiently assigning a radio to the selected channel, and routing packets...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2014

    Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular-Femtocell Networks

    Cognitive radio and femtocell are promising technologies which can satisfy the requirements of future mobile communications in terms of dynamic spectrum sharing and high user density areas. Providing Quality-of-Service (QoS) guaranteed real-time services is challenging issue of future cognitive cellular femtocell mobile networks. In this paper, the authors introduce a...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    Effects of ASE Noise and Dispersion Chromatic on Performance of DWDM Networks Using Distributed Raman Amplifiers

    In this paper, the authors investigate effects of Amplified Spontaneous Emission noise (ASE), Noise Figure (NF) and dispersion chromatic on the performance of DWDM networks using Distributed optical fiber Raman Amplifiers (DRAs) in two different pump configurations, i.e., forward and backward pumping. They found that the pumping configurations, ASE noise,...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    Capacity Dimensioning of HSDPA Urban Network

    Capacity dimensioning is performed before launching a cellular network, which includes coverage estimation and forecast of throughput. Cellular companies are only providing 2G services, while 3G services are still in process of being launched. Although a lot of research has been done on 3G services in developed countries but there...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2014

    Overhead-Controlled Contention-Based Routing for VANETs

    Routing of Vehicular Ad hoc NETworks (VANETs) is a challenging issue that has attracted many attentions of researchers recently. Contention based routing protocols have good congruity with high mobility of nodes in this kind of networks. Prevention from forwarding duplicate packets is an important challenge in such routing protocols. Indeed,...

    Provided By International Journal of Communication Networks and Information Security