The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Smart Pill Reminder and Monitoring SystemIRJET Journal
This document describes a proposed smart pill reminder and monitoring system using IoT technology. The system uses an Arduino microcontroller connected to an IR sensor to detect when medication is taken from a pill box. An ESP module and Android app are used to update the caregiver on medication adherence. The proposed system aims to address limitations of existing methods by integrating additional components like the ESP module and buzzer to send alerts and save data in the cloud. This allows caregivers to remotely monitor patients and ensures medication is taken on schedule.
seminar report iot based health monitoring system 2023.pdfriddheshbore97
This document provides an overview of a seminar report on an IoT-based health monitoring system. The report was submitted by Prerna Ravi Shirsath for their Bachelor of Engineering degree. The report discusses the development of a system that measures a patient's body temperature, heartbeat, and oxygen saturation levels using sensors and sends the data to a mobile application via Bluetooth. It presents the architecture of an IoT health monitoring system which includes medical sensors, a smart gateway, and a back-end system. The report also covers the advantages of such systems in enabling remote monitoring and prevention, reducing healthcare costs, and improving treatment management. Some disadvantages around security, risk of failure, and cost are also discussed.
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
This document summarizes a research paper on a health monitoring system using IoT and Arduino Uno. The system measures body temperature and pulse rate using sensors interfaced with an Arduino board. Wireless data transmission is done through an ESP8266 WiFi module to an IoT platform called ThingSpeak. The collected sensor data is stored on the ThingSpeak server and can be viewed by authorized users. The system aims to provide easy and affordable health monitoring to address issues like lack of resources and doctors in rural areas. It reduces the time and cost of regular health checkups.
This document summarizes literature on health care monitoring systems using wireless sensors and cloud storage. It discusses technologies like ZigBee, embedded microcontrollers, and Bluetooth that are used in wireless sensor networks to monitor patient vitals. The data collected is stored in the cloud and can be accessed by doctors. Challenges discussed include ensuring reliability, quality of service, security, and privacy of patient data. The literature proposes systems for continuous remote patient monitoring, early warning systems, and alerting doctors and caregivers of any issues.
Big data analytics and internet of things for personalised healthcare: opport...IJECEIAES
With the increasing use of technologies and digitally driven healthcare systems worldwide, there will be several opportunities for the use of big data in personalized healthcare. In addition, With the advancements and availability of internet of things (IoT) based point-of-care (POC) technologies, big data analytics and artificial intelligence (AI) can provide useful methods and solutions in monitoring, diagnosis, and self-management of health issues for a better personalized healthcare. In this paper, we identify the current personalized healthcare trends and challenges. Then, propose an architecture to support big data analytics using POC test results of an individual. The proposed architecture can facilitate an integrated and self-managed healthcare as well as remote patient care by adapting three popular machine learning algorithms to leverage the current trends in IoT, big data infrastructures and data analytics for advancing personalized healthcare of the future.
Predictive Data Mining for Converged Internet ofJames Kang
Kang, J. J., Adibi, S., Larkin, H., & Luan, T. (2016). Predictive data mining for Converged Internet of Things: A Mobile Health perspective. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 5-10). IEEE Xplore: IEEE. doi: http://dx.doi.org/10.1109/ATNAC.2015.7366781
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Smart Pill Reminder and Monitoring SystemIRJET Journal
This document describes a proposed smart pill reminder and monitoring system using IoT technology. The system uses an Arduino microcontroller connected to an IR sensor to detect when medication is taken from a pill box. An ESP module and Android app are used to update the caregiver on medication adherence. The proposed system aims to address limitations of existing methods by integrating additional components like the ESP module and buzzer to send alerts and save data in the cloud. This allows caregivers to remotely monitor patients and ensures medication is taken on schedule.
seminar report iot based health monitoring system 2023.pdfriddheshbore97
This document provides an overview of a seminar report on an IoT-based health monitoring system. The report was submitted by Prerna Ravi Shirsath for their Bachelor of Engineering degree. The report discusses the development of a system that measures a patient's body temperature, heartbeat, and oxygen saturation levels using sensors and sends the data to a mobile application via Bluetooth. It presents the architecture of an IoT health monitoring system which includes medical sensors, a smart gateway, and a back-end system. The report also covers the advantages of such systems in enabling remote monitoring and prevention, reducing healthcare costs, and improving treatment management. Some disadvantages around security, risk of failure, and cost are also discussed.
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
This document summarizes a research paper on a health monitoring system using IoT and Arduino Uno. The system measures body temperature and pulse rate using sensors interfaced with an Arduino board. Wireless data transmission is done through an ESP8266 WiFi module to an IoT platform called ThingSpeak. The collected sensor data is stored on the ThingSpeak server and can be viewed by authorized users. The system aims to provide easy and affordable health monitoring to address issues like lack of resources and doctors in rural areas. It reduces the time and cost of regular health checkups.
This document summarizes literature on health care monitoring systems using wireless sensors and cloud storage. It discusses technologies like ZigBee, embedded microcontrollers, and Bluetooth that are used in wireless sensor networks to monitor patient vitals. The data collected is stored in the cloud and can be accessed by doctors. Challenges discussed include ensuring reliability, quality of service, security, and privacy of patient data. The literature proposes systems for continuous remote patient monitoring, early warning systems, and alerting doctors and caregivers of any issues.
Big data analytics and internet of things for personalised healthcare: opport...IJECEIAES
With the increasing use of technologies and digitally driven healthcare systems worldwide, there will be several opportunities for the use of big data in personalized healthcare. In addition, With the advancements and availability of internet of things (IoT) based point-of-care (POC) technologies, big data analytics and artificial intelligence (AI) can provide useful methods and solutions in monitoring, diagnosis, and self-management of health issues for a better personalized healthcare. In this paper, we identify the current personalized healthcare trends and challenges. Then, propose an architecture to support big data analytics using POC test results of an individual. The proposed architecture can facilitate an integrated and self-managed healthcare as well as remote patient care by adapting three popular machine learning algorithms to leverage the current trends in IoT, big data infrastructures and data analytics for advancing personalized healthcare of the future.
Predictive Data Mining for Converged Internet ofJames Kang
Kang, J. J., Adibi, S., Larkin, H., & Luan, T. (2016). Predictive data mining for Converged Internet of Things: A Mobile Health perspective. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 5-10). IEEE Xplore: IEEE. doi: http://dx.doi.org/10.1109/ATNAC.2015.7366781
Smart health monitoring system using IoT based smart fitness mirrorTELKOMNIKA JOURNAL
The smart fitness mirror proposed in this researchaims to provide the users with a platform to monitor their health and fitness status on a daily basis. The system employs a number of sensors to monitor the body mass index (BMI) and amount of body fat present in the user’s body. A weight scale consisting of four load sensors has been implemented to obtain the weight of the user whereas an ultrasonic sensor has been used to measure the height of the user. In addition, four electrode plates have been implemented on the foot weight scale to infuse a small amount of electric current (1mA) for BIA (bioelectrical impedance analysis) to estimate the amount of body fat percentage, lean body mass and total body water. An IR temperature sensor has been implemented in the research to measure the temperature of the user’s body from the forehead. Tests conducted on the system illustrate that it is able to accurately compute the body mass index and perform a bioelectrical impedance analysis on the user. The system is able to achieve a 92.5 % and 93.7 % accuracy in determining the body mass index and body fat percentage respectively. An accuracy of 95.3 % was observed in the determination of the body temperature.
Telehealth care enhancement using the internet of things technologyjournalBEEI
Chronic diseases quickly become broader public health issues because of the difficulty in obtaining appropriate, often long-term health care. So that, it requires the extension of health care for patients with chronic diseases beyond the clinic to include patient’s home and work environment. To reduce costs and provide more appropriate healthcare, we need telehealth care where internet of things (IoT) technology plays an important role. The integration of the IoT and medical science offers opportunities to improve healthcare quality, and efficiency and to better coordinate healthcare delivery at home and in the workplace. In this paper, we present the realization of a remote healthcare system based on the IoT technology. The function of this system is the transmission via a gateway of internet collected data using biomedical sensors node based Arduino board (e.g., temperature, electrical activity of the heart, heart rate monitor). These data will be stored automatically in a cloud. The health can then be monitored by the doctor or patient using a web page in real-time from anywhere at any time in the world using laptops or smart phones, etc. This method also reduces the need for direct interaction between doctor and patient.
Framework for propagating stress control message using heartbeat based iot re...IJECEIAES
Abnormal level of stress is the root indicator factor to have significant impact over the health of heart and there is a close relationship between the stress levels with heart rate. Review of the existing literature showcase that there has been various work that has been carried out towards investigation of considering heart rate with an internet-of-things (IoT) system. Apart from this, existing system doesnt offer any instantaneous solution where certain intimation is offered in real-time to the user with wearables as a solution to control the stress condition. Therefore, the current paper introduces a novel framework where the sampled heart rates of the patients are captured by IoT deivices. The aggregated data are further forwarded to the cloud analytic system that uses correlation to extract the appropriate message. The system after being applied with teh machine learning approach could further extract the elite outcome followed by forwarding the contextual data to teh user. Using an analytical modelliig, the proposed system shows that it offers better accuracy and reduced processing time when compared with other machine learning approach and thereby it proves to be cost effective solution in IoT system over medical case study.
The most fundamental expectation from the healthcare sector is that it provides a safe and reliable environment to serve patients. Medical supplies and equipment have also improved with technological advancements, making them easier to use, providing a better experience, and increasing their longevity. With advancement in technology, medical services can also be tracked for efficiency.
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
This document summarizes a research paper that conducted a comprehensive survey on using the Internet of Things (IoT) for smart healthcare monitoring of patients. The key aspects covered are:
1) IoT enables remote patient monitoring through wearable devices that allow healthcare professionals to monitor patients' conditions without being physically present.
2) The survey reviewed various existing works on IoT-based remote patient monitoring systems that transmit patients' health data like temperature and oxygen levels to doctors via wireless networks and mobile apps.
3) Ensuring patient privacy and security while monitoring and accessing health data remotely is an important challenge addressed in some of the existing research.
Survey of IOT based Patient Health Monitoring Systemdbpublications
The Internet of things has provided a promising opportunity and applications for medical services is one of the most important way or solution for taking care of population which is in rapid growth. Internet of things consists of communication and sensors; wireless body area network is highly suitable tool for the medical IOT device. In this survey we discuss mainly on practical issues for implementation of WBAN to health care service tool for the medical devices. The IoT applications are key enabling technologies in industries. A main aim of this survey paper is that it summarizes the present state-of-the-art IOT in industries and also in workflow hospitals systematically. In recent years wide range of opportunity and powerful of IOT applications are developed in industry. The health monitoring system is a big challenge for several researchers. In this paper introduced on the survey of different IOT applications are used for the health monitoring system. The IoT applications are used to decrease the problems which are related to health care system.
The worldwide network of internet of things (IOT) combined with advancements in sensor networks, FID and software platform connects objects of various application fields and technology. IOT is most commonly described as an ecosystem of technologies but it requires necessary components to enable communication between devices and objects. Components being RFID and sensors. Many organization have already implemented IOT. Healthcare industry too have adopted IOT and can be extensively used in the future for the benefit of patients, elderly people and caregivers. A new concept named 'Health Internet of Things (HIOT)' was proposed to exploit sensor technologies and wireless networks in monitoring medical conditions. Also advancements in E textile technologies make the textile multifunctional, adaptive and responsive system which combined with IOT performs functions such as communication, computation and health care benefits. Cloud is used to store, control and retrieve or transform or classify information. The use of cloud based application in healthcare industries is constantly growing to benefit patients so that they can monitor their health, store and share records. This paper aims at developing a dependable, productive, high performance and assured smart healthcare system to deliver service to patients avoiding health risks using e textile technologies
This document provides a systematic survey of fog and IoT driven healthcare technologies. It discusses the architecture of fog computing in healthcare, which involves an IoT layer with body sensor devices, a fog layer for data analysis and alerts, and a cloud layer for long-term storage. The document compares different healthcare technologies and sensors used for diseases like heart disease, diabetes and more. It identifies several challenges with fog and IoT healthcare systems including increased data processing requirements, limited storage capacity, and need for improved scalability and reduced latency. The survey aims to help researchers understand open issues and directions for future work in this area.
An innovative IoT service for medical diagnosis IJECEIAES
The document proposes an innovative IoT service for medical diagnosis that utilizes IoT and cloud infrastructure to provide a shared environment for medical data between patients and doctors, predicts medical diagnoses and treatments based on multiple classifiers to ensure high accuracy, and includes functionalities such as searching for scientific papers and disease descriptions for unrecognized symptom combinations.
The most fundamental expectation from the healthcare sector is that it provides a safe and reliable environment to serve patients. Medical supplies and equipment have also improved with technological advancements, making them easier to use, providing a better experience, and increasing their longevity. With advancement in technology, medical services can also be tracked for efficiency.
These days heart diseases are
considered as the major health issue. It
includes heart attack and cardiac arrest.
Heart attack is the global leading cause
of death for both the genders and
occurrence is not always know.
Sometimes heart attack is often
compared with other type of pain and
not often dealt with it. Hence, this
project is to implement the heart rate
monitoring using IOT. The patients are
expected to carry or wear a hardware
sensor. The sensor with note the heart
rate and transmits it through internet.
The patient may be expected to set the
high and low heart rate individually. On
reaching the high rate or going below
the expected heart rate, an emergency
alert notification is sent to the patient’s,
guardian, doctor and
ambulance(optional) android devices.
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
In the present generation, healthcare has become the foremost imperative sector in todays medicinal eon. The massive private documents, responsive details are kept in a scalable manner. The healthcare industry has become more competitive in the digital world. As a thriving industry, its challenging for doctors to understand the moving technology in the healthcare sector. This also deals with the patient's nursing and maintains their portfolios. The overview of the project depicts a role played by the doctors, patients, management, and resource suppliers by implementing cloud technology in the healthcare industry. The platform was designed and developed for user friendly interactions where patients can connect with the management and doctors at any corner of the world. The peculiarity of the project was to withdraw the pen paper method followed by the sector for ages. Cloud computing CC has played a vital role in the project that helped and managed to store, secure large data files. The features while operating the system were QR codes, generating e mails, SMS text, and free trunk calls. This approach assists on track with each individuals health related documents, henceforward approving with the doctors to access the knowledge throughout the flow of emergency and firmly access policy. Besides the facts, it rescues the lifetime of the patients and mutually helps the doctors figure it out comfortably. The utilization of mobile aid applications may be a dynamic field and has received the attention of late. This development provides mobile technology additional enticing for mobile health m health applications. The m health defines as wireless telemedicine involving the utilization of mobile telecommunications and multimedia system technologies and their integration with mobile health care delivery systems. As well as human authentication protocols, whereas guaranteeing, has not been straightforward in light weight of their restricted capability of calculation and remembrance. Ms. Rohini Kulkarni | Pratibha Gayke "Transforming Healthcare Industry by Implementing Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46455.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/46455/transforming-healthcare-industry-by-implementing-cloud-computing/ms-rohini-kulkarni
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
This document proposes an Android-based healthcare monitoring and management system using the Internet of Things (IoT). The system uses a body sensor network (BSN) where sensors attached to a patient's body can monitor vital signs wirelessly. The sensor data is sent to a healthcare center via the BSN. The healthcare center then analyzes the data and provides real-time feedback and alerts to patients and their families. This ensures remote patient monitoring and management while improving comfort and healthcare quality. The document discusses the system functionality, literature review on similar systems, algorithms used and security analysis to show how the proposed system addresses security needs in BSN-based healthcare more effectively than previous systems.
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...ijtsrd
Today Internet has become one of the important parts of daily life. It has changed how people live, work, play and learn. Internet serves for many purposes educations, finance, Business, Industries, Entertainment, Social Networking, etc. The IoT is connected objects to the Internet and used to control of those objects or remote monitoring. A health care monitoring system is necessary to constantly monitor the patient's physiological parameters. The main advantage of this system is that the results can be viewed at any time and place. The doctors can be notified by using mobile phones messages if patient health is abnormal. In this system, heartbeat sensor, temperature sensor and blood pressure sensor are used. The system can analyze the signal to detect normal or abnormal conditions. In the system, the internet of things IoT is becoming a major platform for many services and applications. The IoT is generally considered as connecting objects to the Internet and using that connection for control of those objects or remote monitoring. Khin Thet Wai | Nyan Phyo Aung | Lwin Lwin Htay "Internet of Things (IoT) Based Healthcare Monitoring System using NodeMCU and Arduino UNO" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26482.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26482/internet-of-things-iot-based-healthcare-monitoring-system-using-nodemcu-and-arduino-uno/khin-thet-wai
(1) This document summarizes a systematic review of studies on applying the Internet of Things (IoT) concept to surgical practice. Specifically, it focuses on telesurgery, surgical telementoring, image-guided surgery, and patient telemonitoring.
(2) 48 studies on telesurgery and telementoring, 14 studies on image-guided surgery, and 19 studies on patient telemonitoring were analyzed. The studies primarily used observational or model development designs.
(3) Applying IoT to surgery provides benefits like reduced surgical hours, improved access to treatment, and safer/more effective surgical education. However, gaps in the literature need further exploration.
The document summarizes a systematic review of 48 studies on the use of the Internet of Things (IoT) in telesurgery and surgical telementoring. It also briefly discusses 14 studies on IoT applications in image-guided surgery and 19 studies on using IoT for surgical patient telemonitoring. The review found that incorporating IoT has led to benefits like reduced surgical hours, improved access to treatment, and safer/more effective surgical education based on data from 219 patients and 757 healthcare professionals. However, gaps in the literature still exist and warrant further exploration.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET Journal
This document summarizes a research paper that proposes a mobile application using wearable devices to monitor heart rate and location. The application would send notifications to nearby individuals if abnormalities are detected in a user's heart rate or speed. It utilizes sensors in wearable devices to collect heart rate and speed data. If heart rate is high and speed is low, it would notify nearby emergency contacts that the user may need help. If heart rate and speed are both high during exercise, it would notify contacts the user is working out. It uses KNN and Bluetooth algorithms to identify and notify the nearest individuals. The proposed system aims to help users experiencing heart issues and promote safety.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses a mobile health monitoring system that securely stores patient healthcare data in the cloud. It proposes using identity-based encryption and hierarchical identity-based encryption to encrypt health data before storing it in the cloud. This helps address privacy and security issues. The system is designed to efficiently share information between patients and healthcare providers while keeping patient identities and data private.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
Contenu connexe
Similaire à January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
Smart health monitoring system using IoT based smart fitness mirrorTELKOMNIKA JOURNAL
The smart fitness mirror proposed in this researchaims to provide the users with a platform to monitor their health and fitness status on a daily basis. The system employs a number of sensors to monitor the body mass index (BMI) and amount of body fat present in the user’s body. A weight scale consisting of four load sensors has been implemented to obtain the weight of the user whereas an ultrasonic sensor has been used to measure the height of the user. In addition, four electrode plates have been implemented on the foot weight scale to infuse a small amount of electric current (1mA) for BIA (bioelectrical impedance analysis) to estimate the amount of body fat percentage, lean body mass and total body water. An IR temperature sensor has been implemented in the research to measure the temperature of the user’s body from the forehead. Tests conducted on the system illustrate that it is able to accurately compute the body mass index and perform a bioelectrical impedance analysis on the user. The system is able to achieve a 92.5 % and 93.7 % accuracy in determining the body mass index and body fat percentage respectively. An accuracy of 95.3 % was observed in the determination of the body temperature.
Telehealth care enhancement using the internet of things technologyjournalBEEI
Chronic diseases quickly become broader public health issues because of the difficulty in obtaining appropriate, often long-term health care. So that, it requires the extension of health care for patients with chronic diseases beyond the clinic to include patient’s home and work environment. To reduce costs and provide more appropriate healthcare, we need telehealth care where internet of things (IoT) technology plays an important role. The integration of the IoT and medical science offers opportunities to improve healthcare quality, and efficiency and to better coordinate healthcare delivery at home and in the workplace. In this paper, we present the realization of a remote healthcare system based on the IoT technology. The function of this system is the transmission via a gateway of internet collected data using biomedical sensors node based Arduino board (e.g., temperature, electrical activity of the heart, heart rate monitor). These data will be stored automatically in a cloud. The health can then be monitored by the doctor or patient using a web page in real-time from anywhere at any time in the world using laptops or smart phones, etc. This method also reduces the need for direct interaction between doctor and patient.
Framework for propagating stress control message using heartbeat based iot re...IJECEIAES
Abnormal level of stress is the root indicator factor to have significant impact over the health of heart and there is a close relationship between the stress levels with heart rate. Review of the existing literature showcase that there has been various work that has been carried out towards investigation of considering heart rate with an internet-of-things (IoT) system. Apart from this, existing system doesnt offer any instantaneous solution where certain intimation is offered in real-time to the user with wearables as a solution to control the stress condition. Therefore, the current paper introduces a novel framework where the sampled heart rates of the patients are captured by IoT deivices. The aggregated data are further forwarded to the cloud analytic system that uses correlation to extract the appropriate message. The system after being applied with teh machine learning approach could further extract the elite outcome followed by forwarding the contextual data to teh user. Using an analytical modelliig, the proposed system shows that it offers better accuracy and reduced processing time when compared with other machine learning approach and thereby it proves to be cost effective solution in IoT system over medical case study.
The most fundamental expectation from the healthcare sector is that it provides a safe and reliable environment to serve patients. Medical supplies and equipment have also improved with technological advancements, making them easier to use, providing a better experience, and increasing their longevity. With advancement in technology, medical services can also be tracked for efficiency.
IRJET- A Comprehensive Survey on Smart Healthcare Monitoring of Patients usin...IRJET Journal
This document summarizes a research paper that conducted a comprehensive survey on using the Internet of Things (IoT) for smart healthcare monitoring of patients. The key aspects covered are:
1) IoT enables remote patient monitoring through wearable devices that allow healthcare professionals to monitor patients' conditions without being physically present.
2) The survey reviewed various existing works on IoT-based remote patient monitoring systems that transmit patients' health data like temperature and oxygen levels to doctors via wireless networks and mobile apps.
3) Ensuring patient privacy and security while monitoring and accessing health data remotely is an important challenge addressed in some of the existing research.
Survey of IOT based Patient Health Monitoring Systemdbpublications
The Internet of things has provided a promising opportunity and applications for medical services is one of the most important way or solution for taking care of population which is in rapid growth. Internet of things consists of communication and sensors; wireless body area network is highly suitable tool for the medical IOT device. In this survey we discuss mainly on practical issues for implementation of WBAN to health care service tool for the medical devices. The IoT applications are key enabling technologies in industries. A main aim of this survey paper is that it summarizes the present state-of-the-art IOT in industries and also in workflow hospitals systematically. In recent years wide range of opportunity and powerful of IOT applications are developed in industry. The health monitoring system is a big challenge for several researchers. In this paper introduced on the survey of different IOT applications are used for the health monitoring system. The IoT applications are used to decrease the problems which are related to health care system.
The worldwide network of internet of things (IOT) combined with advancements in sensor networks, FID and software platform connects objects of various application fields and technology. IOT is most commonly described as an ecosystem of technologies but it requires necessary components to enable communication between devices and objects. Components being RFID and sensors. Many organization have already implemented IOT. Healthcare industry too have adopted IOT and can be extensively used in the future for the benefit of patients, elderly people and caregivers. A new concept named 'Health Internet of Things (HIOT)' was proposed to exploit sensor technologies and wireless networks in monitoring medical conditions. Also advancements in E textile technologies make the textile multifunctional, adaptive and responsive system which combined with IOT performs functions such as communication, computation and health care benefits. Cloud is used to store, control and retrieve or transform or classify information. The use of cloud based application in healthcare industries is constantly growing to benefit patients so that they can monitor their health, store and share records. This paper aims at developing a dependable, productive, high performance and assured smart healthcare system to deliver service to patients avoiding health risks using e textile technologies
This document provides a systematic survey of fog and IoT driven healthcare technologies. It discusses the architecture of fog computing in healthcare, which involves an IoT layer with body sensor devices, a fog layer for data analysis and alerts, and a cloud layer for long-term storage. The document compares different healthcare technologies and sensors used for diseases like heart disease, diabetes and more. It identifies several challenges with fog and IoT healthcare systems including increased data processing requirements, limited storage capacity, and need for improved scalability and reduced latency. The survey aims to help researchers understand open issues and directions for future work in this area.
An innovative IoT service for medical diagnosis IJECEIAES
The document proposes an innovative IoT service for medical diagnosis that utilizes IoT and cloud infrastructure to provide a shared environment for medical data between patients and doctors, predicts medical diagnoses and treatments based on multiple classifiers to ensure high accuracy, and includes functionalities such as searching for scientific papers and disease descriptions for unrecognized symptom combinations.
The most fundamental expectation from the healthcare sector is that it provides a safe and reliable environment to serve patients. Medical supplies and equipment have also improved with technological advancements, making them easier to use, providing a better experience, and increasing their longevity. With advancement in technology, medical services can also be tracked for efficiency.
These days heart diseases are
considered as the major health issue. It
includes heart attack and cardiac arrest.
Heart attack is the global leading cause
of death for both the genders and
occurrence is not always know.
Sometimes heart attack is often
compared with other type of pain and
not often dealt with it. Hence, this
project is to implement the heart rate
monitoring using IOT. The patients are
expected to carry or wear a hardware
sensor. The sensor with note the heart
rate and transmits it through internet.
The patient may be expected to set the
high and low heart rate individually. On
reaching the high rate or going below
the expected heart rate, an emergency
alert notification is sent to the patient’s,
guardian, doctor and
ambulance(optional) android devices.
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
In the present generation, healthcare has become the foremost imperative sector in todays medicinal eon. The massive private documents, responsive details are kept in a scalable manner. The healthcare industry has become more competitive in the digital world. As a thriving industry, its challenging for doctors to understand the moving technology in the healthcare sector. This also deals with the patient's nursing and maintains their portfolios. The overview of the project depicts a role played by the doctors, patients, management, and resource suppliers by implementing cloud technology in the healthcare industry. The platform was designed and developed for user friendly interactions where patients can connect with the management and doctors at any corner of the world. The peculiarity of the project was to withdraw the pen paper method followed by the sector for ages. Cloud computing CC has played a vital role in the project that helped and managed to store, secure large data files. The features while operating the system were QR codes, generating e mails, SMS text, and free trunk calls. This approach assists on track with each individuals health related documents, henceforward approving with the doctors to access the knowledge throughout the flow of emergency and firmly access policy. Besides the facts, it rescues the lifetime of the patients and mutually helps the doctors figure it out comfortably. The utilization of mobile aid applications may be a dynamic field and has received the attention of late. This development provides mobile technology additional enticing for mobile health m health applications. The m health defines as wireless telemedicine involving the utilization of mobile telecommunications and multimedia system technologies and their integration with mobile health care delivery systems. As well as human authentication protocols, whereas guaranteeing, has not been straightforward in light weight of their restricted capability of calculation and remembrance. Ms. Rohini Kulkarni | Pratibha Gayke "Transforming Healthcare Industry by Implementing Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46455.pdf Paper URL : https://www.ijtsrd.com/engineering/computer-engineering/46455/transforming-healthcare-industry-by-implementing-cloud-computing/ms-rohini-kulkarni
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
This document proposes an Android-based healthcare monitoring and management system using the Internet of Things (IoT). The system uses a body sensor network (BSN) where sensors attached to a patient's body can monitor vital signs wirelessly. The sensor data is sent to a healthcare center via the BSN. The healthcare center then analyzes the data and provides real-time feedback and alerts to patients and their families. This ensures remote patient monitoring and management while improving comfort and healthcare quality. The document discusses the system functionality, literature review on similar systems, algorithms used and security analysis to show how the proposed system addresses security needs in BSN-based healthcare more effectively than previous systems.
Internet of Things IoT Based Healthcare Monitoring System using NodeMCU and A...ijtsrd
Today Internet has become one of the important parts of daily life. It has changed how people live, work, play and learn. Internet serves for many purposes educations, finance, Business, Industries, Entertainment, Social Networking, etc. The IoT is connected objects to the Internet and used to control of those objects or remote monitoring. A health care monitoring system is necessary to constantly monitor the patient's physiological parameters. The main advantage of this system is that the results can be viewed at any time and place. The doctors can be notified by using mobile phones messages if patient health is abnormal. In this system, heartbeat sensor, temperature sensor and blood pressure sensor are used. The system can analyze the signal to detect normal or abnormal conditions. In the system, the internet of things IoT is becoming a major platform for many services and applications. The IoT is generally considered as connecting objects to the Internet and using that connection for control of those objects or remote monitoring. Khin Thet Wai | Nyan Phyo Aung | Lwin Lwin Htay "Internet of Things (IoT) Based Healthcare Monitoring System using NodeMCU and Arduino UNO" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26482.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26482/internet-of-things-iot-based-healthcare-monitoring-system-using-nodemcu-and-arduino-uno/khin-thet-wai
(1) This document summarizes a systematic review of studies on applying the Internet of Things (IoT) concept to surgical practice. Specifically, it focuses on telesurgery, surgical telementoring, image-guided surgery, and patient telemonitoring.
(2) 48 studies on telesurgery and telementoring, 14 studies on image-guided surgery, and 19 studies on patient telemonitoring were analyzed. The studies primarily used observational or model development designs.
(3) Applying IoT to surgery provides benefits like reduced surgical hours, improved access to treatment, and safer/more effective surgical education. However, gaps in the literature need further exploration.
The document summarizes a systematic review of 48 studies on the use of the Internet of Things (IoT) in telesurgery and surgical telementoring. It also briefly discusses 14 studies on IoT applications in image-guided surgery and 19 studies on using IoT for surgical patient telemonitoring. The review found that incorporating IoT has led to benefits like reduced surgical hours, improved access to treatment, and safer/more effective surgical education based on data from 219 patients and 757 healthcare professionals. However, gaps in the literature still exist and warrant further exploration.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
IRJET- A Wearable Device Data Sharing and Collaboration in Mobile Healthcare ...IRJET Journal
This document summarizes a research paper that proposes a mobile application using wearable devices to monitor heart rate and location. The application would send notifications to nearby individuals if abnormalities are detected in a user's heart rate or speed. It utilizes sensors in wearable devices to collect heart rate and speed data. If heart rate is high and speed is low, it would notify nearby emergency contacts that the user may need help. If heart rate and speed are both high during exercise, it would notify contacts the user is working out. It uses KNN and Bluetooth algorithms to identify and notify the nearest individuals. The proposed system aims to help users experiencing heart issues and promote safety.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses a mobile health monitoring system that securely stores patient healthcare data in the cloud. It proposes using identity-based encryption and hierarchical identity-based encryption to encrypt health data before storing it in the cloud. This helps address privacy and security issues. The system is designed to efficiently share information between patients and healthcare providers while keeping patient identities and data private.
Similaire à January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf (20)
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
1. January 2024: Top10
Read Articles in
Computer Networks
& Communications
International Journal of Computer
Networks& Communications (IJCNC)
http://airccse.org/journal/ijcnc.html
(Scopus, ERA Listed, WJCI Indexed)
Scopus Cite Score 2022—1.8
ISSN 0974 - 9322 (Online); 0975 - 2293 (Print)
Citations, h-index, i10-index
2. REAL TIME WIRELESS HEALTH MONITORING APPLICATION
USING MOBILE DEVICES
Amna Abdullah, Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed Tarique
Department of Electrical Engineering, Ajman University of Science and Technology, P.O. Box
2202, Fujairah, United Arab Emirates
ABSTRACT
In the last decade the healthcare monitoring systems have drawn considerable attentions of the
researchers. The prime goal was to develop a reliable patient monitoring system so that the
healthcare professionals can monitor their patients, who are either hospitalized or executing their
normal daily life activities. In this work we present a mobile device based wireless healthcare
monitoring system that can provide real time online information about physiological conditions of
a patient. Our proposed system is designed to measure and monitor important physiological data
of a patient in order to accurately describe the status of her/his health and fitness. In additionthe
proposed system is able to send alarming message about the patient’s critical health data by text
messages or by email reports. By using the information contained in the text or e-mail message the
healthcare professional can provide necessary medical advising. The system mainly consists of
sensors, the data acquisition unit, microcontroller (i.e., Arduino), and software (i.e., LabVIEW).
The patient’s temperature, heart beat rate, muscles, blood pressure, blood glucose level, and ECG
data are monitored, displayed, and stored by our system. To ensure reliabilityand accuracy the
proposed system has been field tested. The test results show that our system is able to measure the
patient’s physiological data with a very high accuracy.
KEYWORDS
ZigBee, remote healthcare, mobile device, patient monitoring, LabView
For More Details: https://airccse.org/journal/cnc/7315cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2015.html
3. REFERENCES
[1] Global Challenges for Humanity available at
http://www.millenniumproject.org/millennium/challenges.html
[2] A Right to Health available at http://www.who.int/mediacentre/factsheets
[3] FRANCIS S. COLLINS, “MOBILE TECHNOLOGY AND HEALTHCARE”,
AVAILABLE at http://www.nlm.nih.gov/medlineplus/magazine/issues/winter11
[4] How the Smartphone Can Revolutionize Healthcare available at http://www.mdtmag.com/
[5] mHealth App Developer Economics(2014) available at
http://mhealtheconomics.com/mhealthdeveloper-economics-report/
[6] Bourouis, A., Feham, M., and Bouchachia, A.(2011), “ Ubiquitous Mobile Health Monitoring
System for Elderly (UMHMSE)”, International Journal of Computer Science and Information
Technology, Vol.2, No. 3, June, pp. 74-82
[7] Lee, Y.D. and Chung, W.Y. (2009) “Wireless Sensor Network Based Wearable Smart Shirt
for Ubiquitous Health and Activity Monitoring”, Sensors and Actuators B: Chameical, Vol. 140,
No. 2, July, pp. 390-395
[8] Orlando R. E. P., Caldeira, M. L. P. Lei S., and Rodrigues, J.P.C (2014), “An Efficient and
Low Cost Windows Mobile BSN Monitoring SystemBased on TinyOS”, Journal of
Telecommunication Systems, Vol. 54, No. 1, pp. 1-9
[9] Yuce, M. R.(2010)” Implementation of wireless body area networks for healthcare systems”,
Sensor and Actuators A:Physical, Vol. 162, No. 1, July, pp. 116-129
[10] Lei Clifton, David A. Clifton, Marco A. F. Pimentel, Peter J. Watkinson, and Lionel
Tarassenko (2014),” Predictive Monitoring of Mobile Patients by Combining Clinical
Observations with Data From Wearable Sensors”, IEEE Journal of Biomedical and Health
Informatics, Vol. 18, No. 3, May , pp. 722-730
[11] Parane, K.A., Patil, N.C. ; Poojara, S.R. ; Kamble, T.S(2014) “Cloud based Intelligent
Healthcare Monitoring System”, In the proceedings of International Conference on Issues and
Challenges in Intelligent Computing Techniques (ICICT), February 7-8, Ghaziabad, Indian, pp.
697-701
[12] Xiaoliang Wang ; Qiong Gui ; Bingwei Liu ; Zhanpeng Jin et al (2014), “Enabling Smart
Personalized Healthcare: A Hybrid Mobile-Cloud Approach for ECG Telemonitoring”, IEEE
Journal of Biomedical and Health Informatics, Vol. 18, No. 3, May, pp. 739 – 745
[13] Dunsmuir, D., Payne, B. ; Cloete, G. ; Petersen, C.(2014), “Development of m-Health
Applications for Pre-eclampsia Triage”, IEEE Journal of Biomedical and Health Informatics, Vol.
PP, No. 99, January , pp. 2168-2194
4. [14] Tello, J.P. ; Manjarres, O. ; Quijano, M. ; Blanco, A. et al(2013) , “ Remote Monitoring
System of ECG and Human Body Temperature Signals”, IEEE Latin American Transaction,
Vol. 11, No. 1, February, pp. 314-318
[15] Moreira, H. ; Oliveira, R. ; Flores, N.(2013), “STAlz: Remotely supporting the diagnosis,
tracking and rehabilitation of patients with Alzheimer's”, In the Proceedings of the 15th IEEE
Conference on E-health Networking, Applications, and Services, October 9-12, Lisbob, pp. 580-
584
[16] Touati, F. ; Tabish, R. ; and Ben Mnaouer, A.(2013), “Towards u-health: An indoor
6LoWPAN based platform for real-time healthcare monitoring”, In the proceedings of the IFIP
International Conference on Wireless and Mobile Networking, April 20-23, 2013,Dubai, pp. 1-4
[17] Strisland, F. ; Sintef,; Svagard, I. ; Seeberg, T.M.(2013) “ESUMS: A mobile system for
continuous home monitoring of rehabilitation patient”, In the proceedings of the 35th IEEE Annual
International Conference on Engineering in Medicine and Biology Society, July 3-7, 2013, Osaka,
pp. 4670-4673
[18] Yun-Hong Noh ; Jiunn Huei Yap ; and Do-Un Jeong(2013) “Implementation of the
Abnormal ECG Monitoring System Using Heartbeat Check Map Technique”, In the proceedings
of International Conference on IT Convergence and Security, December 16-18, 2013, Macao, pp.
1-4
[19] Triantafyllidis, A.K. ; Koutkias, V.G. ; Chouvarda, I. ; Maglaveras, N.(2013) “A Pervasive
Health System Integrating Patient Monitoring, Status Logging, and Social Sharing”, IEEE Journal
on Biomedical and Health Informatics, Vol. 17, No. 1, January , pp. 30-37
[20] Bin Yu ; Lisheng Xu ; Yongxu Li(2012) “Bluetooth Low Energy (BLE) based mobile
electrocardiogram monitoring system”, In the proceedings of International Conference on
Information and Automation, June 6-8, 2012, Shenyang, pp. 763-767
[21] Mitra, P. ; Poellabauer, C.(2012) ,” Emergency response in smartphone-based Mobile Ad-
Hoc Networks”, In the proceedings of IEEE International Conference on Communication, June
10-15, Ottawa, pp. 6091 - 6095
[22] Ospino, M.R. ; Ariza, L.C. ; Rojas, J.G., (2012), ”Mobile system for monitoring
measurements in hypertensive patients”, In the proceedings of the IEEE Colombian
Communication conference, May 16-18, CA, pp. 1-6
[23] Ruipeng Gao ; Liqiong Yang ; Xinyu Wu ; and Tao Wang, (2012) “A phone-based e-health
system for OSAS and its energy issue”, In the proceedings of the International Symposium on
Information Technology in Medicine and Education, August 3-5, 2012, Hokodate, Hokkaido, pp.
682-696
[24] https://www.zigbee.org/
5. [25] The IEEE 802.15.4 standard available at
http://standards.ieee.org/getieee802/download/802.15.4d2009.pdf
Bluetooth Developer Portal available at
https://developer.bluetooth.org/TechnologyOverview/Pages/Compare.aspx
6. HISTOGRAM OF NEIGHBORHOOD TRIPARTITE AUTHENTICATION
WITH FINGERPRINT-BASED BIOMETRICS FOR IOT SERVICES
S. Kanchana
Department of Computer Science, PSG College of Arts & Science, Coimbatore, India
ABSTRACT
Internet of Things (IoT) and services is an interesting topic with a wide range of potential
applications like smart home systems, health care, telemedicine, and intelligent transportation.
Traditionally, key agreement schemes have been evaluated to access IoT services which are highly
susceptible to security. Recently, Biometric-based authentication is also used to access IoT
services and devices. They are involving a larger amount of memory with increased running time
and found to be computationally infeasible. To provide robust authentication for IoT services,
Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB)
for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns
and a histogram of features to extract the region of interest. To reduce the memory requirements
while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing
(HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern
Registration (NBPR) is integrated with the normalized sparse representation based on the
histogram. Additionally, this work presents a new Tripartite User Authentication model for
fingerprint biometric template matching process. When compared with different state-of-the-art
methods, the proposed method depicts significantly improved performance in terms of matching
accuracy, computational overhead and execution speed and is highly effective in delivering smart
home services.
KEYWORDS
Binary Patterns, Fingerprint Biometrics, Histogram, Internet of Things, Neighborhood Tripartite
Authentication.
For More Details: https://aircconline.com/ijcnc/V11N5/11519cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
7. REFERENCES
[1] Munish Bhatia, Sandeep K. Sood, “A comprehensive health assessment framework to facilitate
IoTassisted smart workouts: A predictive healthcare perspective”, Computers in Industry, Elsevier,
2017. https://doi.org/10.1016/j.compind.2017.06.009 .
[2] Parwinder Kaur Dhillon, Sheetal Kalra, “A lightweight biometrics based remote user
authentication scheme for IoT services”, Journal of Information Security and Applications, Elsevier,
2017. https://doi.org/10.1016/j.jisa.2017.01.003
[3] Ortega-Garcia, Javier, “The multi scenario multi environment biosecure multimodal database"
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010.
https://doi.org/10.1109/tpami.2009.76
[4] Jun Xu, Xiong Zhang, and Meng Zhou, “A High-Security and Smart Interaction System Based
on Hand Gesture Recognition for Internet of Things”, Hindawi, Security and Communication
Networks, 2018. https://doi.org/10.1155/2018/4879496
[5] Li Yang, Zhiming Zheng, “Cryptanalysis and improvement of a biometrics-based authentication
and key agreement scheme for multi-server environments”, PLOS ONE, 2018,
https://doi.org/10.1371/journal.pone.0194093
[6] M. Shamim Hossain et al., “Toward End-to-End Biometrics-Based Security for IoT
Infrastructure”, IEEE Wireless Communications, 2016. https://doi.org/10.1109/mwc.2016.7721741
[7] Younsung Choi, Youngsook Lee, Jongho Moon, Dongho Won, “Security enhanced multi-factor
biometric authentication scheme using bio-hash function”, PLOS ONE, 2017.
https://doi.org/10.1371/journal.pone.0176250.
[8] Seyedehsamaneh Shojaeilangari, Wei-Yun Yau, Karthik Nandakumar, Li Jun, Eam Khwang
Teoh, “Robust Representation and Recognition of Facial Emotions Using Extreme Sparse Learning”,
IEEE Transactions on Image Processing, 2015. https://doi.org/10.1109/tip.2015.2416634
[9] Juan S. Arteaga-Falconi, Hussein Al Osman, Abdulmotaleb El Saddik, “ECG and Fingerprint
Bimodal Authentication”, Sustainable Cities and Society, Elsevier, 2017.
https://doi.org/10.1016/j.scs.2017.12.023
[10] Pedro Peris-Lopez, Lorena Gonzalez-Manzano, Carmen Camara, Jose Maria de Fuentes, “Effect
of attacker characterization in ECG-based continuous authentication mechanisms for Internet of
Things”, Future Generation Computer Systems, Elsevier, 2017.
https://doi.org/10.1016/j.future.2017.11.037
[11] Haibo Yi, Zhe Nie, “Side-channel security analysis of UOV signature for cloud-based Internet
of Things”, Future Generation Computer Systems, Elsevier, 2018.
https://doi.org/10.1016/j.future.2018.04.083
[12] Wencheng Yang, Jiankun Hu, Song Wang, Qianhong Wu, “Biometrics Based Privacy-
Preserving Authentication and Mobile Template Protection”, Hindawi Wireless Communications
and Mobile Computing, 2018. https://doi.org/10.1155/2018/7107295
[13] Dong-Hwan Park, Hyo-Chan Bang, Cheol Sik Pyo, Soon-Ju Kang, “Semantic Open IoT Service
8. Platform Technology”, IEEE World Forum on Internet of Things, 2014.
https://doi.org/10.1109/wfiot.2014.6803125
[14] Igor Miladinovic, Sigrid Schefer-Wenzl, “NFV Enabled IoT Architecture for an Operating
Room Environment”, IEEE 4th World Forum on Internet of Things (WF-IoT), 2018.
https://doi.org/10.1109/wf-iot.2018.8355128
[15] Paul Loh Ruen Chze, Kan Siew Leong, “A Secure Multi-Hop Routing for IoT Communication”,
IEEE World Forum on Internet of Things (WF-IoT), 2014.
https://doi.org/10.1109/wfiot.2014.6803204
[16] Shulong Wang, Yibin Hou, Fang Gao, Xinrong Ji, “A Novel IoT Access Architecture for
Vehicle Monitoring System”, IEEE 3rd World Forum on Internet of Things , 2016.
https://doi.org/10.1109/wf-iot.2016.7845396
[17] Jong Hyuk Park, Neil Yuwen Yen, “Advanced algorithms and applications based on IoT for the
smart Devices”, Journal of Ambient Intelligence and Humanized Computing, 2018.
https://doi.org/10.1007/s12652-018-0715-5
[18] Lavinia, Mihaela, Dinca, Gerhard Petrus Hancke, “The Fall of One, the Rise of Many: A Survey
on Multi-Biometric Fusion Methods”, IEEE Access (Volume: 5), 2017.
https://doi.org/10.1109/access.2017.2694050
[19] Yaman Sharaf-Dabbagh, Walid Saad, “Demo Abstract: Cyber-Physical Fingerprinting for
Internet of Things Authentication”, ACM/IEEE Second International Conference on Internet-of-
Things Design and Implementation (IoTDI), 2017. https://doi.org/10.1145/3054977.3057323
9. GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND
EFFECTIVE SOLUTIONS
Li Nyen Thin, Lau Ying Ting, Nor Adila Husna and Mohd Heikal Husin
School of Computer Sciences, Universiti Sains Malaysia, Malaysia
ABSTRACT
Today, Global Positioning System (GPS) is widely used in almost every aspect of our daily life.
Commonly, users utilize the technology to track the position of a vehicle or an object of interest.
They also use it to safely navigate to the destination of their choice. As a result, there are countless
number of GPS based tracking application that has been developed. But, a main recurring issue that
exists among these applications are the inaccuracy of the tracking faced by users and this issue has
become a rising concern. Most existing research have examined the effects that the inaccuracy of
GPS have on users while others identified suitable methods to improve the accuracy of GPS based
on one or two factors. The objective of this survey paper is to identify the common factors that affects
the accuracy of GPS and identify an effective method which could mitigate or overcome most of
those factors. As part of our research, we conducted a thorough examination of the existing factors
for GPS inaccuracies. According to an initial survey that we have collected, most of the respondents
has faced some form of GPS inaccuracy. Among the common issues faced are inaccurate object
tracking and disconnection of GPS signal while using an application. As such, most of the
respondents agree that it is necessary to improve the accuracy of GPS. This leads to another objective
of this paper, which is to examine and evaluate existing methods as well as to identify the most
effective method that could improve the accuracy of GPS.
KEYWORDS
GPS, accuracy factors, improve accuracy, global positioning system
For More Details: https://aircconline.com/ijcnc/V8N2/8216cnc11.pdf
Volume Link: https://airccse.org/journal/ijc2016.html
10. REFERENCES
[1] Lin, J.Y, Yang, B.K., Tuan A.D., and Chen, H.C. (2013). “The Accuracy Enhancement of GPS
Track in Google Map”, 2013 Eighth International Conference on Broadband and Wireless
Computing, Communication and Applications, Compiegne, France. pp. 524-527.
[2] Iqbal, A., Mahmood. H., Farooq, U., Kabir, M.A. and Asad, M.U.. (2009). “An Overview of the
Factors Responsible for GPS Signal Error: Origin and Solution”, 2009 International Conference on
Wireless Networks and Information Systems, Shanghai, China. pp. 294-299.
[3] Bajaj, R., Ranaweera, S.L., Agrawal, D.P.. (2002). “GPS: Location-tracking Technology”,
Computer, vol.35, no..4, pp. 92-94.
[4] Huang, J.Y., and Tsai, C.H.. (2008). “Improve GPS Positioning Accuracy with Context
Awareness”, 2008 First IEEE International Conference on Ubi-Media Computing, Lanzhou, China,
pp. 94-99.
[5] Wubbena, G., Andreas, B., Seeber, G., Boder, V. and Hankemeier, P., (1996). “Reducing
Distance Dependant Errors for Real-Time Precise DGPS Applications by Establishing Reference
Station Networks”. In Proceedings of the 9th International Technical Meeting of the Satellite
Division of the Institute of Navigation (ION GPS-96)
[6] Enge, P., Walter, T., Pullen, S., Kee, C., Chao, Y. and Tsai, Y. (1996). “Wide area augmentation
of the global positioning system”. Proceedings of the IEEE, vol. 84 Aug. 1996, pp. 1063–1088.
[7] Qi, H. and Moore, J. B. (2002). “Direct Kalman Filtering Approach for GPS/INS Integration”,
IEEE Trans. Aerosp, Electron. System. vol. 38, no. 2, 2002, pp. 687-693.
[8] Malleswari, B.L., MuraliKrishna, I.V., Lalkishore, K., Seetha, M., Nagaratna, P. H. “The Role of
Kalman Filter in the Modelling of GPS Errors”, Journal of Theoretical and Applied Information
Technology, pp. 95-101.
[9] White, C.E., Bernstein, D. and Kornhauser, Alain L.. (2000). “Some map matching algorithms
for personal navigation assistants”. Transportation Research Part C, No. 8, 2000, pp. 91-108.
11. A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY
AND STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University, Amman,
Jordan
ABSTRACT
The information security has become one of the most significant problems in data communication.
So it becomes an inseparable part of data communication. In order to address this problem,
cryptography and steganography can be combined. This paper proposes a secure communication
system. It employs cryptographic algorithm together with steganography. The jointing of these
techniques provides a robust and strong communication system that able to withstand against
attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide
high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based
steganography is employed to hide the encrypted message in the cover image by modifying the
wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise
ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides
high level of security.
KEYWORDS
Steganography, Cryptography, DWT, Filter bank, PSNR
For More Details: https://airccse.org/journal/cnc/5313cnc10.pdf
Volume Link: https://airccse.org/journal/ijc2013.html
12. REFERENCES
[1] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and
Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5,
No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational
System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13,
No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images",
IEEE, 2nd International conference on Computing, Communication and Networking Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using
Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical
Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High
Capacity Image Steganography Technique", Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE
International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through
Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International
Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system
using Steganography, AES and RSA", IEEE 17th International Symposium for Design and
Technology in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based
on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference
for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia
Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information
Content using New Encryption Method and Steganography", IEEE Third International Conference
on Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography",
13. IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using
Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol.
3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and
Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden,
Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based
on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
14. DYNAMIC ROUTING OF IP TRAFFIC BASED ON QOS PARAMETERS
Martin Kriška1 , Jozef Janitor2 and Peter Fecilak3
1Computer Networks Laboratory, Technical University of Kosice, Slovakia 2 Institute of
Computer Technology, Technical University of Kosice, Slovakia 3Department of Computers and
Informatics, Technical University of Kosice, Slovakia
ABSTRACT
The article looks into the current state of the art of dynamic routing protocols with respect to
their possibilities to react to changes in the Quality of Service when selecting the best route towards
a destination network. New options that could leverage information about the ever changing QoS
parameters for data communication are analysed and a Cisco Performance Routing solution is
described more in detail. The practical part of this work focuses on a design and implementation
of a test bed that provides a scalable laboratory architecture to manipulate QoS parameters of
different data communications flowing through it. The test bed is used in various use cases that
were used to evaluate Cisco Performance Routing optimization capabilitiesin different scenarios.
KEYWORDS
Performance Routing, PfR, Quality of Service, QoS, Optimized Edge Routing
For More Details: https://airccse.org/journal/cnc/6414cnc02.pdf
Volume Link: https://airccse.org/journal/ijc2014.html
15. REFERENCES
[1] Information Sciences Institute, University of Southern California. RFC 791 INTERNET
PROTOCOL - DARPA INTERNET PROGRAM, PROTOCOL SPECIFICATION. s.l. : Internet
Engineering Task Force, 1981.
[2] Cisco Systems, Inc. Route Selection in Cisco Routers. Cisco. [Online] 2008. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/8651/21.pdf.
[3] D. Savage, et. al.: Enhanced Interior Gateway Routing Protocol. IETF. [Online] 2013 [Date:
25th of October 2013.] http://tools.ietf.org/html/draft-savage-eigrp-00.
[4] Teare Diane: Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide.
Indianapolis: Cisco Press, 2010. ISBN 1587058820.
[5] Cisco Systems, Inc. BGP Best Path Selection Algorithm. Cisco. [Online] 2012. [Date: 25th of
October 2013.] http://www.cisco.com/image/gif/paws/13753/25.pdf.
[6] Doyle Jeff, Carroll Jennifer: CCIE Professional Development Routing TCP/IP Volume I.
Indianapolis: Cisco Press, 2006. ISBN 1587052024.
[7] D. Awduche, et. al.: RSVP-TE: Extensions to RSVP for LSP Tunnels. IETF. [Online] 2013
[Date: 11th of November 2013.] http://tools.ietf.org/html/rfc3209.
[8] X. Fu, et. al.: RSVP-TE extensions for Loss and Delay Traffic Engineering. IETF. [Online]
2013 [Date: 11th of November 2013.] http://tools.ietf.org/html/draft-fuxh-mpls-delay-loss-rsvp-
te-ext02.
[9] Z. Seils. Defining SDN Overview of SDN Terminology & Concepts. Cisco. [Online] 2013.
[Date: 4 th of October 2013.] https://learningnetwork.cisco.com/docs/DOC-21946.
[10] Cisco Systems, Inc. onePK Chat and Demo at Cisco Live. SlideShare. [Online] 2012. [Date:
4th of October 2013.] http://www.slideshare.net/getyourbuildon/onepk-chat-and-demo-at-cisco-
live.
[11] S. Cadora. Hitchhiker's Guide to onePK. Cisco. [Online] 2013. [Date: 12th of September
2013.] https://learningnetwork.cisco.com/docs/DOC-22910.
[12] R. Trunk. Understanding Performance Routing (PfR). Chesapeake Netcraftsmen. [Online]
2009. [Date: 15th of November 2013.] http://netcraftsmen.net/archived-documents/c-mug-
articlearchive/7-20090922-cmug-understanding-performance-routing/file.html?limit=10.
[13] Kalita Hemanta Kumar, Nambiar Manoj K.: Designing WANem: A Wide Area Network
Emulator tool. Bangalore, 2011. ISBN 9780769546186.
[14] R. Pandi Selvam, V.Palanisamy: An efficient cluster based approach for multi-source
multicast routing protocol in mobile ad hoc networks, International Journal of Computer
16. CONGESTION AND ENERGY AWARE MULTIPATH LOAD
BALANCING ROUTING FOR LLNS
Kala Venugopal and T G Basavaraju
Department of Computer Science and Engineering, Government Engineering College, Hassan,
Karnataka, India
ABSTRACT
The Internet of Things (IoT) is presently in its golden era with its current technological evolution
towards digital transformation. Low-power and Lossy Networks (LLNs) form the groundwork for
IoT, where the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designated by
Internet Engineering Task Force as the benchmark protocol for routing. Although RPL, with its
unique capabilities, has addressed many IoT routing requirements, Load balancing and Congestion
control are the outliers. This paper builds on the RPL protocol and proposes a multipath Congestion
and Energy Aware RPL (CEARPL) that alleviates the load balancing and congestion concerns
associated with RPL and improves the network performance. For congestion avoidance, a
Congestion and Energy Aware Objective Function (CEA-OF) is suggested during parent selection
that considers multiple metrics like Child Count metric, Estimated Lifetime metric, and Queue
Occupancy metric, to equally distribute the traffic in LLNs. The Queue Occupancy metric is used
to detect congestion in the network, and a Multipath routing strategy is utilized to mitigate the
congestion in the network. A comparison of the performance of CEA-RPL was made against the
existing Objective Functions of RPL, OFO, and MRHOF, as well as COM-OF, utilizing Contiki
OS 3.0's Cooja emulator. CEA-RPL projected superior results with power consumption lowering
by 33%, endto-end delay decreasing by 30%, queue loss ratio reducing by 49%, and packet
receiving rate and network lifetime improving by 7% and 49%, on an average, respectively.
KEYWORDS
Congestion, Multipath routing, Internet of Things, Load balancing, Low-power Lossy Networks,
Objective function & RPL
For More Details: https://aircconline.com/ijcnc/V15N3/15323cnc05.pdf
Volume Link: https://airccse.org/journal/ijc2023.html
17. REFERENCES
[1] https://dataprot.net/statistics/iot-statistics/
[2] T. Winter et al., (2012) “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, IETF
RFC 6550.
[3] The Internet Engineering Task Force (IETF), 2010. .
[4] Routing Over Low Power and Lossy Networks (ROLL), 2004.
[5] O. Gaddour & A. Koubaa, (2012) “RPL in a nutshell: A survey”, Elsevier, Computer Networks,
Volume 56, Issue 14, Pages 3163-3178, doi: 10.1016/j.comnet.2012.06.016
[6] Doruk Pancaroglu, Sevil Sen, (2021) “Load balancing for RPL-based Internet of Things: A
review”, Ad Hoc Networks, Volume 116, 102491, ISSN 1570-8705,
https://doi.org/10.1016/j.adhoc.2021.102491.
[7] B. G. Mamoun Qasem, Ahmed Al-Dubai & Imed Romdhani, (2017) “Load balancing objective
function in RPL”, ROLL – WG INTERNET DRAFT, pp. 1–10
[8] C, Lim, (2019) "A Survey on Congestion Control for RPL-Based Wireless Sensor Networks",
Sensors 19, no. 11: 2567. https://doi.org/10.3390/s19112567
[9] P. Thubert, (2012) “Objective function zero for the routing protocol for low-power and lossy
networks (RPL)”, RFC 6552.
[10] O. Gnawali & P. Levis, (2012) “The Minimum Rank with Hysteresis Objective Function”, RFC
6719
[11] Ibrahim S. Alsukayti, (2020) “The support of multipath routing in IPv6-based internet of
things”, International Journal of Electrical and Computer Engineering (IJECE). 10. 2208.
10.11591/ijece.v10i2.pp2208-2220.
[12] J. Tsai & T. Moors, (2006) “A Review of Multipath Routing Protocols: From Wireless Ad Hoc
to Mesh Networks”, 17-18 July
[13] M. Geuzouri, N. Mbarek & A. Temar, (2020) A new way of achieving multipath routing in
wireless networks”, International Journal of Wireless and Mobile Computing. 18. 101.
10.1504/IJWMC.2020.10026464.
[14] A. Bhat & V. Geetha, (2017) "Survey on routing protocols for Internet of Things”, 7th
International Symposium on Embedded Computing and System Design (ISED), pp. 1-5, doi:
10.1109/ISED.2017.8303949.
[15] O. Iova, F. Theoleyre & T. Noel, (2015) “Exploiting multiple parents in RPL to improve both
the network lifetime and its stability", 2015 IEEE International Conference on Communications
(ICC), pp. 610-616, doi: 10.1109/ICC.2015.7248389.
[16] M. A. Lodhi, A. Rehman, M. M. Khan & F. B. Hussain, (2015) "Multiple path RPL for low
power lossy networks", 2015 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob),
18. pp. 279- 284, doi: 10.1109/APWiMob.2015.7374975.
[17] P. Levis, T. Clausen, J. Hui, O. Gnawali & J. Ko, (2011) “The trickle algorithm", March 2011,
IETF RFC 6206.
[18] Q. Le, T. Ngo-Quynh & T. Magedanz, (2014) "RPL-based multipath Routing Protocols for
Internet of Things on Wireless Sensor Networks", 2014 International Conference on Advanced
Technologies for Communications (ATC 2014), pp. 424-429, doi: 10.1109/ATC.2014.7043425.
[19] Radi, Marjan, Behnam Dezfouli, Kamalrulnizam Abu Bakar, & Malrey Lee, (2012) "Multipath
Routing in Wireless Sensor Networks: Survey and Research Challenges", Sensors 12, no. 1: 650685.
https://doi.org/10.3390/s120100650
[20] W. Lou, W. Liu & Y. Zhang, (2006) “Performance Optimization Using Multipath Routing in
Mobile Ad Hoc and Wireless Sensor Networks”, 10.1007/0-387-29026-5_5.
[21] Z. Wang, L. Zhang, Z. Zheng et al., (2018) “Energy balancing RPL protocol with multipath for
wireless sensor networks. Peer-to-Peer Networks”, Appl. 11, 1085–1100,
https://doi.org/10.1007/s12083-017-0585-1
[22] Oana Iova, Fabrice Theoleyre & Thomas Noel, (2015) “Using Multiparent Routing in RPL to
Increase the Stability and the Lifetime of the Network”, Ad Hoc Networks, Elsevier, 29,
10.1016/j.adhoc.2015.01.020, hal-01206380
[23] M. Lodhi, Abdul Rehman, Meer Khan, M. Asfand-E-yar & F. Hussain, (2017) “Transient
multipath routing protocol for low power and lossy networks”, KSII Transactions on Internet and
Information Systems,11, 2002-2019, 10.3837/tiis.2017.04.010.
[24] T. L. Jenschke, G. Z. Papadopoulos, R. -A. Koutsiamanis & N. Montavont, (2019) "Alternative
Parent Selection for Multi-Path RPL Networks", 2019 IEEE 5th World Forum on Internet of Things
(WF-IoT), pp. 533-538, doi: 10.1109/WF-IoT.2019.8767236.
[25] Tomas Lagos Jenschke, Remous-Aris Koutsiamanis, Georgios Papadopoulos, Nicolas
Montavont, (2021) “ODeSe: On-Demand Selection for multipath RPL networks”, Ad Hoc Networks,
Elsevier, 114, pp.102431. 10.1016/j.adhoc.2021.102431. hal-03122968v2f
[26] F. Kaviani & M. Soltanaghaei, (2022) “CQARPL: Congestion and QoS-aware RPL for IoT
applications under heavy traffic”, The Journal of Supercomputing, 78, 10.1007/s11227-02204488-2.
[27] H. -S. Kim, H. Kim, J. Paek & S. Bahk, (2017) "Load Balancing Under Heavy Traffic in RPL
Routing Protocol for Low Power and Lossy Networks", in IEEE Transactions on Mobile Computing,
vol. 16, no. 4, pp. 964-979, 1 April 2017, doi: 10.1109/TMC.2016.2585107.
[28] Kala Venugopal & T. G. Basavaraju, (2022) “A Combined Metric Objective Function for RPL
Load Balancing in Internet of Things”, International Journal of Internet of Things, Vol. 10 No. 1,
2022, pp. 22-31. doi: 10.5923/j.ijit.20221001.02.
[29] S. Wakatsuki, N. Komuro, H. Sekiya & S. Sakata, (2014) “Prolonging network lifetime for
6LoWPAN / RPL wireless sensor network using mobile sink with dynamic sojourn time”, 2014
[30] M. Aboubakar, M. Kellil, A. Bouabdallah & P. Roux, (2019) “Toward intelligent
19. reconfiguration of RPL networks using supervised learning”, 2019 Wireless Days (WD),
Manchester, United Kingdom, pp. 1-4, 2019, DOI: 10.1109/WD.2019.8734236.
[31] Mah Zaib Jamil, Danista Khan, Adeel Saleem, Kashif Mehmood & Atif Iqbal, (2019)
“Comparative performance analysis of RPL for low power and lossy networks based on different
objective functions”, International Journal of Advanced Computer Science and Applications, Vol.
10, No. 5, DOI: 10.14569/IJACSA.2019.0100524
[32] Contiki O.S and Cooja simulator, http://www.contiki-os.org/ [33] T. Zahariadis & P. Trakadas,
(2022) “Design guidelines for routing metrics composition in LLN”, ROLL Internet Draft, 2022
[34] Nesrine Khernane, Jean Couchot & Ahmed Mostefaoui, (2018) “Maximum network lifetime
with optimal power/rate and routing trade-off for wireless multimedia sensor networks”, Computer
Communications, Elsevier, 124, pp.1 – 16, hal-02182832
[35] Moteiv Corporation. Tmote sky: Datasheet (2006):
https://insense.cs.standrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf, Nov 13, 2006
[36] H.A.A. Al-Kashoash, H. Kharrufa, Y. Al-Nidawi. et al., (2019) “Congestion control in wireless
sensor and LoWPAN Networks: toward the Internet of Things”, Wireless Netw 25, 4493-4522,
https://doi.org/10.1007/s11276-018-1743-y
20. A DEEP LEARNING TECHNIQUE FOR WEB PHISHING DETECTION
COMBINED URL FEATURES AND VISUAL SIMILARITY
Saad Al-Ahmadi1 and Yasser Alharbi 2
1College of Computer and Information Science, Computer Science Department, King Saud
University, Riyadh, Saudi Arabia 2College of Computer and Information Science, Computer
Engineering Department, King Saud University, Riyadh, Saudi Arabia
ABSTRACT
The most popular way to deceive online users nowadays is phishing. Consequently, to increase
cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper,
we propose an approach that rely on websites image and URL to deals with the issue of phishing
website recognition as a classification challenge. Our model uses webpage URLs and images to
detect a phishing attack using convolution neural networks (CNNs) to extract the most important
features of website images and URLs and then classifies them into benign and phishing pages. The
accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the
proposed model in detecting a web phishing attack.
KEYWORDS
Phishing detection, URL, visual similarity, deep learning, convolution neural network.
For More Details: https://aircconline.com/ijcnc/V12N5/12520cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2020.html
21. REFERENCES
[1] H. Thakur, “Available Online at www.ijarcs.info A Survey Paper On Phishing Detection,” vol.
7, no. 4, pp. 64–68, 2016.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification of web phishing detection
schemes,” Security and Communication Networks. 2016, doi: 10.1002/sec.1674.
[3] E. S. Aung, T. Zan, and H. Yamana, “A Survey of URL-based Phishing Detection,” pp. 1–8,
2019, [Online]. Available: https://db-event.jpn.org/deim2019/post/papers/201.pdf.
[4] S. Nakayama, H. Yoshiura, and I. Echizen, “Preventing false positives in content-based phishing
detection,” in IIH-MSP 2009 - 2009 5th International Conference on Intelligent Information Hiding
and Multimedia Signal Processing, 2009, doi: 10.1109/IIH-MSP.2009.147.
[5] A. K. Jain and B. B. Gupta, “Phishing detection: Analysis of visual similarity based approaches,”
Security and Communication Networks. 2017, doi: 10.1155/2017/5421046.
[6] A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A Survey of the Recent Architectures of
Deep Convolutional Neural Networks,” pp. 1–68, 2019, doi: 10.1007/s10462-020-09825-6.
[7] J. Mao et al., “Phishing page detection via learning classifiers from page layout feature,” Eurasip
J. Wirel. Commun. Netw., 2019, doi: 10.1186/s13638-019-1361-0.
[8] I. F. Lam, W. C. Xiao, S. C. Wang, and K. T. Chen, “Counteracting phishing page polymorphism:
An image layout analysis approach,” in Lecture Notes in Computer Science (including subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2009, doi:
10.1007/978-3-642- 02617-1_28.
[9] T. C. Chen, T. Stepan, S. Dick, and J. Miller, “An anti-phishing system employing diffused
information,” ACM Trans. Inf. Syst. Secur., vol. 16, no. 4, 2014, doi: 10.1145/2584680.
[10] A. S. Bozkir and E. A. Sezer, “Use of HOG descriptors in phishing detection,” in 4th
International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, doi:
10.1109/ISDFS.2016.7473534.
[11] F. C. Dalgic, A. S. Bozkir, and M. Aydos, “Phish-IRIS: A New Approach for Vision Based
Brand Prediction of Phishing Web Pages via Compact Visual Descriptors,” ISMSIT 2018 - 2nd Int.
Symp. Multidiscip. Stud. Innov. Technol. Proc., 2018, doi: 10.1109/ISMSIT.2018.8567299.
[12] K. L. Chiew, E. H. Chang, S. N. Sze, and W. K. Tiong, “Utilisation of website logo for phishing
detection,” Comput. Secur., 2015, doi: 10.1016/j.cose.2015.07.006.
[13] K. L. Chiew, J. S. F. Choo, S. N. Sze, and K. S. C. Yong, “Leverage Website Favicon to Detect
Phishing Websites,” Secur. Commun. Networks, 2018, doi: 10.1155/2018/7251750.
[14] Y. Zhou, Y. Zhang, J. Xiao, Y. Wang, and W. Lin, “Visual similarity based anti-phishing with
the combination of local and global features,” in Proceedings - 2014 IEEE 13th International
Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014,
2015, doi: 10.1109/TrustCom.2014.28.
22. [15] A. P. E. Rosiello, E. Kirda, C. Kruegel, and F. Ferrandi, “A layout-similarity-based approach
for detecting phishing pages,” in Proceedings of the 3rd International Conference on Security and
Privacy in Communication Networks, SecureComm, 2007, doi: 10.1109/SECCOM.2007.4550367.
[16] J. Mao, P. Li, K. Li, T. Wei, and Z. Liang, “BaitAlarm: Detecting phishing sites using similarity
in fundamental visual features,” in Proceedings - 5th International Conference on Intelligent
Networking and Collaborative Systems, INCoS 2013, 2013, doi: 10.1109/INCoS.2013.151.
[17] S. Haruta, H. Asahina, and I. Sasase, “Visual Similarity-Based Phishing Detection Scheme
Using Image and CSS with Target Website Finder,” in 2017 IEEE Global Communications
Conference, GLOBECOM 2017 - Proceedings, 2017, doi: 10.1109/GLOCOM.2017.8254506.
[18] H. Zhang, G. Liu, T. W. S. Chow, and W. Liu, “Textual and visual content-based anti-phishing:
A Bayesian approach,” IEEE Trans. Neural Networks, 2011, doi: 10.1109/TNN.2011.2161999.
[19] E. Medvet, E. Kirda, and C. Kruegel, “Visual-similarity-based phishing detection,” Proc. 4th
Int. Conf. Secur. Priv. Commun. Networks, Secur., no. September 2008, 2008, doi:
10.1145/1460877.1460905.
[20] S. G. Selvaganapathy, M. Nivaashini, and H. P. Natarajan, “Deep belief network based detection
and categorization of malicious URLs,” Inf. Secur. J., vol. 27, no. 3, pp. 145–161, 2018, doi:
10.1080/19393555.2018.1456577.
[21] Y. Ding, N. Luktarhan, K. Li, and W. Slamu, “A keyword-based combination approach for
detecting phishing webpages,” Comput. Secur., vol. 84, pp. 256–275, 2019, doi:
10.1016/j.cose.2019.03.018.
[22] H. huan Wang, L. Yu, S. wei Tian, Y. fang Peng, and X. jun Pei, “Bidirectional LSTM Malicious
webpages detection algorithm based on convolutional neural network and independent recurrent
neural network,” Appl. Intell., vol. 49, no. 8, pp. 3016–3026, 2019, doi: 10.1007/s10489-019-01433-
4.
[23] M. Zouina and B. Outtaj, “A novel lightweight URL phishing detection system using SVM and
similarity index,” Human-centric Comput. Inf. Sci., vol. 7, no. 1, pp. 1–13, 2017, doi:
10.1186/s13673-017-0098-1.
[24] S. Parekh, D. Parikh, S. Kotak, and S. Sankhe, “A New Method for Detection of Phishing
Websites: URL Detection,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no.
Icicct, pp. 949–952, 2018, doi: 10.1109/ICICCT.2018.8473085.
[25] H. Le, Q. Pham, D. Sahoo, and S. C. H. Hoi, “URLNet: Learning a URL Representation with
Deep Learning for Malicious URL Detection,” no. i, 2018, [Online]. Available:
http://arxiv.org/abs/1802.03162.
[26] J. Saxe and K. Berlin, “eXpose: A Character-Level Convolutional Neural Network with
Embeddings For Detecting Malicious URLs, File Paths and Registry Keys,” 2017, [Online].
Available: http://arxiv.org/abs/1702.08568.
[27] K. Shima et al., “Classification of URL bitstreams using bag of bytes,” 21st Conf. Innov. Clouds,
Internet Networks, ICIN 2018, pp. 1–5, 2018, doi: 10.1109/ICIN.2018.8401597.
23. [28] R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Evaluating deep learning approaches
to characterize and classify malicious URL’s,” J. Intell. Fuzzy Syst., vol. 34, no. 3, pp. 1333–1343,
2018, doi: 10.3233/JIFS-169429.
[29] O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection
from URLs,” Expert Syst. Appl., vol. 117, pp. 345–357, 2019, doi: 10.1016/j.eswa.2018.09.029.
[30] W. Wang, F. Zhang, X. Luo, and S. Zhang, “PDRCNN: Precise Phishing Detection with
Recurrent Convolutional Neural Networks,” Secur. Commun. Networks, 2019, doi:
10.1155/2019/2595794.
[31] S. Khan, H. Rahmani, S. A. A. Shah, and M. Bennamoun, “A Guide to Convolutional Neural
Networks for Computer Vision,” Synth. Lect. Comput. Vis., 2018, doi:
10.2200/s00822ed1v01y201712cov015.
[32] V. Karthikeyani and S. Nagarajan, “Machine Learning Classification Algorithms to Recognize
Chart Types in Portable Document Format (PDF) Files,” Int. J. Comput. Appl., 2012, doi:
10.5120/4789- 6997.
[33] M. A. Adebowale, K. T. Lwin, and M. A. Hossain, “Deep learning with convolutional neural
network and long short-term memory for phishing detection,” 2019 13th Int. Conf. Software,
Knowledge, Inf. Manag. Appl. Ski. 2019, no. March 2019, doi:
10.1109/SKIMA47702.2019.8982427.
[34] C. Opara, B. Wei, and Y. Chen, “HTMLPhish: Enabling Phishing Web Page Detection by
Applying Deep Learning Techniques on HTML Analysis,” no. October 2018, 2019, [Online].
Available: http://arxiv.org/abs/1909.01135.
24. VIVONET: VISUALLY-REPRESENTED, INTENT- BASED, VOICE-
ASSISTED NETWORKING
Amar Chaudhari, Amrita Asthana, Atharva Kaluskar, Dewang Gedia, Lakshay Karani, Levi
Perigo, Rahil Gandotra and Sapna Gangwar
Interdisciplinary Telecom Program, University of Colorado Boulder, USA
ABSTRACT
Networks have become considerably large, complex and dynamic. The configuration, operation,
monitoring, and troubleshooting of networks is a cumbersome and time-consuming task for the
network administrators as they must deal with the physical layer, underlying protocols, addressing
systems, control rules, and many other low-level details. This research paper proposes an Intent-
based networking system (IBNS) coupled with voice-assistance that can abstract the underlying
network infrastructure and allow administrators to alter its behavior by expressing intents via voice
commands. The system also displays the real-time network topology along with the highlighted
intents on an interactive web application that can be used for network diagnostics. Compared to
traditional networks, the concepts of software-defined networking (SDN) make it easier to
integrate a voice assistant that allows configuring the network based on intents.
KEYWORDS
Network Management, SDN, Voice-Assistance, Intent-Based Networking & Realtime
Visualization.
For More Details: https://aircconline.com/ijcnc/V11N2/11219cnc01.pdf
Volume Link: https://airccse.org/journal/ijc2019.html
25. REFERENCES
[1] N. Feamster, J. Rexford, and E. Zegura, “The Road to SDN: An Intellectual History of
Programmable Networks,” ACM Queue, New York, NY, USA, Tech. Rep., 2013.
[2] Y. Han, J. Li, D. Hoang, J. Yoo and J. Hong, “An intent-based network virtualization platform
for SDN,” IEEE 12th International Conference on Network and Service Management (CNSM), pp.
353- 358, 2016.
[3] Y. Tsuzaki and Y. Okabe, “Reactive configuration updating for Intent-Based Networking,” IEEE
International Conference on Information Networking (ICOIN), pp. 97-102, 2017.
[4] Open Networking Foundation, “Intent NBI – Definition and Principles,” Technical
Recommendation, 2016.
5] Open Networking Foundation. Software-Defined Networking (SDN) Definition - Open
Networking Foundation. [online] Available at: https://www.opennetworking.org/sdn-definition/.
[6] H. Feng, K. Fawaz and K. Shin, “Continuous Authentication for Voice Assistants”, ACM 23rd
Annual International Conference on Mobile Computing and Networking, pp. 343-355, 2017.
[7] V. Kpuska and G. Bohouta, “Next-generation of virtual personal assistants (Microsoft Cortana,
Apple Siri, Amazon Alexa and Google Home),” IEEE 8th Annual Computing and Communication
Workshop and Conference (CCWC), pp. 99-103, 2018.
[8] B. Dhingra et al., “Towards End-to-End Reinforcement Learning of Dialogue Agents for
Information Access,” Association for Computational Linguistics annual meeting, 2017.
[9] S. Amrutha et al., “Voice Controlled Smart Home,” International Journal of Emerging
Technology and Advanced Engineering, vol. 5, January 2015.
[10] A. Rajalakshmi and H. Shahnasser, “Internet of Things using Node-Red and alexa,” 7th
International Symposium on Communications and Information Technologies (ISCIT), pp. 1-4, 2017
[11] A. Voellmy, H. Kim, and N. Feamster, “Procera: a language for high-level reactive network
control,” in Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks (HotSDN
’12), pp. 43–48, ACM, Helsinki, Finland, August 2012.
[12] P. H. Isolani, J. A. Wickboldt, C. B. Both, J. Rochol and L. Z. Granville, “Interactive monitoring,
visualization, and configuration of OpenFlow-based SDN,” IFIP/IEEE International Symposium on
Integrated Network Management, pp. 207-215, 2015.
[13] Y. Watashiba et al., “OpenFlow Network Visualization Software with Flow Control Interface,”
IEEE 37th Annual Computer Software and Applications Conference, pp. 475-477, 2013.
[14] W. Wassapon, P. Uthayopas, C. Chantrapornchai and K. Ichikawa, “Real-time monitoring and
visualization software for OpenFlow network”, 15th International Conference on ICT and
Knowledge Engineering (ICT&KE), pp. 1-5, 2017.
[15] V.T. Guimaraes et al., “Improving productivity and reducing cost through the use of
visualizations for SDN management,” IEEE Symposium on Computers and Communication (ISCC),
26. pp. 531-538, 2016.
[16] NeMo-project.net, NeMo - The Application's interface to Intent Based Networks. [online]
Available at: http://NeMo-project.net/.
[17] Wiki.onosproject.org, Intent Framework – ONOS – Wiki. [online] Available at:
https://wiki.onosproject.org/display/ONOS/Intent+Framework.
[18] R. Cohen et al., “An intent-based approach for network virtualization,” IFIP/IEEE International
Symposium on Integrated Network Management, pp. 42-50, 2013.
[19] Cisco. (2018). Intent-Based Networking. [online] Available at:
https://www.cisco.com/c/en/us/solutions/intent-based-networking.html.
[20] Openvswitch.org. Open vSwitch | Production Quality, Multilayer Open Virtual Switch.
Available at: http://openvswitch.org/. [21] Project Floodlight. (2018). Projects - Project Floodlight.
[online] Available at: http://www.projectfloodlight.org/projects/.
[22] Djangoproject.com. (2018). The Web framework for perfectionists with deadlines — Django.
[online] Available at: https://www.djangoproject.com/.
[23] NGINX. (2018). NGINX — High Performance Load Balancer, Web Server, & Reverse Proxy.
[online] Available at: https://www.nginx.com/.
[24] MariaDB.org. (2018). MariaDB.org. [online] Available at: https://mariadb.org/.
[25] Developer.amazon.com. (2018). Alexa Skills Kit - Build for Voice with Amazon. [online]
Available at: https://developer.amazon.com/alexaskills-kit.
[26] Visjs.org. vis.js - A dynamic, browser based visualization library. [online] Available at:
http://visjs.org.
[27] Vmware.com. ESXi | Bare Metal Hypervisor | VMware. [online] Available at:
https://www.vmware.com/products/esxi-and-esx.html. [28] Frrouting.org. FRRouting. [online]
Available at: https://frrouting.org/.
[29] Duo.com. Double Up on Security With Two-Factor Authentication (2FA). [online] Available
at: https://duo.com/product/trusted-users/two-factor-authentication.
[30] J. Rath, “Integrating SDN into the Data Center.” [online] Available at:
http://documents.tips/business/integrating-sdninto-the-data-center.html.
[31] Open Networking Foundation, “OpenFlow Switch Specification; Version 1.3.0(Wire Protocol
0x04).”, p.40, 2012. [online]. Available at:
https://www.opennetworking.org/images/stories/downloads/sdnresources/onfspecifications/openflo
w/openflow-spec-v1.3.0.pdf.
[32] R. Gandotra and L. Perigo, "SDNMA: A Software-defined, Dynamic Network Manipulation
Application to Enhance BGP Functionality," in Proceedings of the 20th IEEE International
Conference on High Performance Computing and Communications (HPCC), 2018.
27. [33] D. Gedia, and L. Perigo, “NetO-App: A Network Orchestration Application for Centralized
Network Management in Small Business Networks” in 4th International Conference on Computer
Science, Engineering and Information Technology (CSITY-2018), Sydney, Australia, pp. 61-72,
July, 2018, DOI: 10.5121/csit.2018.81106.
[34] D. Gedia, and L. Perigo, “A Centralized Network Management Application for Academia and
Small Business Networks” in Information Technology in Industry (ITII)-indexed in web of science,
Australia, Sept, 2018.
[35] N. Foster, R. Harrison, M. J. Freedman et al., “Frenetic: a network programming language,” in
Proceedings of the 16th ACM SIGPLAN International Conference on Functional Programming
(ICFP ’11), pp. 279–291, ACM, Tokyo, Japan, September 2011.
28. CLUSTER BASED ROUTING USING ENERGY AND DISTANCE
AWARE MULTI-OBJECTIVE GOLDEN EAGLE OPTIMIZATION IN
WIRELESS SENSOR NETWORK
Gundeboyina Srinivasalu1 and Hanumanthappa Umadevi2
1Department of Electronics & Communication Engineering, Cambridge Institute of Technology,
Bangalore, India 2 Department of Electronics & Communication Engineering, Dr. Ambedkar
Institute of Technology, Bengaluru, India
ABSTRACT
In recent years, WSNs have attracted significant attention due to the improvements in various
sectors such as communication, electronics, and information technologies. When the clustering
algorithm incorporates both Euclidean distance and energy, it automatically decreases the energy
consumption. So, the major goal of this research is to reduce energy consumption for prolong the
lifetime of the network. In order to achieve an energy-efficient process, Energy and Distance
Aware Multi-Objective Golden Eagle Optimization (ED-MOGEO) is proposed in this research. In
addition, this proposed solution reduces retransmissions and delays to improve the performance
metrics. And so, this research carried out two major fitness functions (Euclidean distance and
energy) for creating an energy-efficient WSN. Furthermore, energy consideration is used to reduce
the nodes unavailability which results in packet loss during the transmission. For generating the
routing path between the source and the Base Station (BS), the ED-MOGEO algorithm is used.
From the simulation results, it shows that Proposed ED-MOGEO achieves better performances in
terms of residual energy (14.36 J), end-to-end delay (12.9 ms), packet delivery ratio (0.994),
normalized routing overhead (0.11), and throughput (1.131 Mbps) when compared to existing
Cluster-Based Data Aggregation (CBDA) and Elephant Herding Optimization (EHO)-Greedy
methods.
KEYWORDS
Multi-Objective Golden Eagle Optimization, Wireless Sensor Networks, Energy Consumption,
Network Lifetime, Euclidean Distance
For More Details: https://aircconline.com/ijcnc/V14N3/14322cnc03.pdf
Volume Link: https://airccse.org/journal/ijc2022.html
29. REFERENCES
[1] Biradar, Shivshanker P., and Vishwanath,T. S. (2021). “Optimized Cluster Establishment and
Cluster-Head Selection Approach in WSN”, International Journal of Computer Networks &
Communications (IJCNC), Vol. 13, No. 4, pp. 53-70.
[2] Ahn, J., Lim, S., &Cho, T. (2021). “Fuzzy Logic-based Efficient Message Route Selection
Method to Prolong the Network Lifetime in WSNs”, International Journal of Computer Networks
& Communications (IJCNC), Vol. 13, No. 6, pp. 73-91.
[3] Morsi, A.M., Barakat, T.M. and Nashaat, A.A. (2020). “An Efficient and Secure Malicious
Node Detection Model for Wireless Sensor Networks”, International Journal of Computer
Networks & Communications (IJCNC),Vol. 12, No.1, pp. 97-108.
[4] Ahn, J., Lim, S. and Cho, T. (2021). “Fuzzy Logic-based Efficient Message Route Selection
Method to Prolong the Network Lifetime in WSNs”, International Journal of Computer Networks
& Communications (IJCNC), Vol. 13, no. 6, pp. 73-91.
[5] Sohail, M., Khan, S., Ahmad, R., Singh, D. & Lloret, J. (2019). “Game theoretic solution for
power management in IoT-based wireless sensor networks”, Sensors, Vol. 19, No. 18, pp. 3835.
[6] Alagarsamy, V. and Ranjan, P.V. (2019). “Multi-Cluster Multi-Channel Scheduling (Mms)
Algorithm for Maximum Data Collection with Delay Minimization in WSN”, International Journal
of Computer Networks & Communications (IJCNC), Vol 11, No. 6, pp. 91-110.
[7] Ravikiran, D.N. and Dethe, C.G. (2018). “Improvements in Routing Algorithms to Enhance
Lifetime of Wireless Sensor Networks”, International Journal of Computer Networks &
Communications (IJCNC), Vol. 10, No. 2, pp. 23-32.
[8] Vu, V.H., Thien, H.T. and Koo, I. (2019). “A repeated games-based secure multiple-channels
communications scheme for secondary users with randomly attacking eavesdroppers”, Applied
Sciences, Vol. 9, No. 5, pp. 868.
[9] Abdalzaher, M.S. and Muta, O. (2020). “A game-theoretic approach for enhancing security
and data trustworthiness in IoT applications”, IEEE Internet of Things Journal, Vol. 7, No. 11,
pp11250- 11261.
[10] Casado‐Vara, R., Prieto‐Castrillo, F. & Corchado, J.M. (2018). “A game theory approach for
cooperative control to improve data quality and false data detection in WSN”, International Journal
of Robust and Nonlinear Control, Vol. 28, No. 16, pp. 5087-5102.
[11] Qin, X., Wang, X., Wang, L., Lin, Y. & Wang, X. (2019). “An efficient probabilistic routing
scheme based on game theory in opportunistic networks”, Computer Networks, Vol. 149, pp. 144-
153.
[12] El Assari, Y. (2020). “Energy-efficient multi-hop routing with unequal clustering approach
30. for wireless sensor networks”, International Journal of Computer Networks & Communications
(IJCNC),Vol. 12, No. 3, pp. 55-73.
[13] Jouhari, M., Ibrahimi, K., Tembine, H., Benattou, M. & Ben Othman, J., (2019). “Signalling
game approach to improve the MAC protocol in the underwater wireless sensor networks”,
International Journal of Communication Systems, Vol. 32, No. 13, pp. e3971.
[14] Raja, P. & Dananjayan, P. (2016). “Game theory-based efficient energy consumption routing
protocol to enhance the lifetime of WSN”, International Journal of Information and
Communication Technology, Vol. 8, No. 4, pp. 357-370.
[15] Farahani, G. (2019). “Energy Consumption Reduction in Wireless Sensor Network Based on
Clustering”, International Journal of Computer Networks & Communications (IJCNC), Vol. 11,
No. 2, pp. 33-51.
[16] Sirdeshpande, N. and Udupi, V. (2017). “Fractional lion optimization for cluster head-based
routing protocol in wireless sensor network”,Journal of the Franklin Institute, Vol. 354, No. 11,
pp. 4457- 4480.
[17] Daneshvar,S.M.H., Mohajer,P.A.A., &Mazinani, S.M. (2019). “Energy-efficient routing in
WSN: A centralized cluster-based approach via grey wolf optimizer”, IEEE Access, Vol. 7, pp.
170019- 170031, 2019.
[18] Morsy, N.A., AbdelHay,E.H.,& Kishk, S.S. (2018). “Proposed Energy Efficient Algorithm
for Clustering and Routing in WSN”, Wireless Personal Communications, Vol. 103, No. 3, pp.
2575- 2598, 2018.
[19] Vinitha, A., Rukmini,M.S.S.,& Sunehra, D. (2020). “Energy‐efficient multihop routing in
WSN using the hybrid optimization algorithm”, International Journal of Communication Systems,
Vol. 33, No. 12, ppe4440, 2020.
[20] Devi, V. S., Ravi, T., & Baghavathi Priya, S. (2020). “Cluster based data aggregation scheme
for latency and packet loss reduction in WSN”, Computer Communications, Vol. 149 pp36-43.
[21] Pattnaik, S., &Sahu,P. K. (2020). “Assimilation of fuzzy clustering approach and EHO‐
Greedy algorithm for efficient routing in WSN”, International Journal of Communication Systems,
Vol. 33, No. 8, ppe4354.
[22] Lalwani, P., Das, S., Banka, H.,& Kumar, C., (2018). “CRHS: clustering and routing in
wireless sensor networks using harmony search algorithm”, Neural Computing and Applications,
Vol. 30, No. 2, pp639-659.