AdHoc Networks Research Papers - Academia.edu (original) (raw)

As ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks are no longer sufficient and effective when adapted directly to a wireless ad-hoc network. In this article,... more

As ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks are no longer sufficient and effective when adapted directly to a wireless ad-hoc network. In this article, first the security challenges in intrusion detection for ad-hoc networks are identified and the related work for anomaly detection is discussed. We then propose a layered intrusion detection framework, which consists of collection, detection and alert modules that are handled by local agents. The collection, detection and alert modules are uniquely enabled with the main operations of ad-hoc networking, which are found at the OSI link and network layers. The proposed modules are based on interpolating polynomials and linear threshold schemes. An experimental evaluation of these modules shows their efficiency for several attack scenarios, such as route logic compromise, traffic patterns distortion and denial of service attacks.

This paper focuses on an essential task of the enhanced NodeB eNodeB element in LTE architecture, the Radio Resource Manager RRM, which aims to accept or reject requests for connection to the network based on some constraints and ensuring... more

This paper focuses on an essential task of the enhanced NodeB eNodeB element in LTE architecture, the Radio Resource Manager RRM, which aims to accept or reject requests for connection to the network based on some constraints and ensuring optimal distribution of radio resources between Users Equipments UEs. Its main functionalities include Admission Control AC and Packet Scheduling PS. This paper will center mainly on the PS part of the RRM task, which performs the radio resource allocation in both uplink and downlink directions. Several approaches and algorithms have been proposed in the literature to address this need (allocate resources efficiently), the diversity and multitude of algorithms is related to the factors considered for the optimal management of radio resource, specifically, the traffic type and the QoS (Quality of Service) requested by the UE. In this article, an art’s state of the radio resource allocation strategies and a detailed study of several scheduling algorithms proposed for LTE (uplink and downlink) are made. Therefore, we offer our evaluation and criticism.

Wireless sensor networks are very broadly used in many applications. Sensor networks still have problems in conveying data from one sensor node to other node. Routing algorithms are developed for wireless sensor networks. In this... more

Wireless sensor networks are very broadly used in many applications. Sensor networks still have
problems in conveying data from one sensor node to other node. Routing algorithms are developed for wireless
sensor networks. In this paper, some of them are discussed. These protocols still have some problems in sensor
networks. Ad hoc networks and WSNs are similar to each other as both depend on hop-to-hop routing. So,
protocols developed for ad-hoc networks are also used in many sensor applications. But sensor nodes are not
much capable for these protocols.These protocols with some changes can be used in sensor networks.In this
paper ADSR is discussed, which is developed for WSNs and derived from changes done in DSR, which was
developed for MANETs. Moto of this paper is to give an idea that other protocols which were developed for
MANETs can be completely used in WSNs, by having angle-based mechanism, as described in ADSR.

Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct communication and collaboration between nodes. There are three main families of P2P networks: the... more

Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally.

The increasing demand of wireless applications has put a lot of limitations on the use of available radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire spectrum is not used at all the... more

The increasing demand of wireless applications has put a lot of limitations on the use of available radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive radio is a technique where secondary user looks for a free band to use when primary user is not in use of its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which can be utilized by secondary user with high spectral resolution capability. The idea of simulation and analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was brought in this paper and this work digs into the practical implementation of a Cognitive radio system. MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically

Background & Objective: Vanet is ad-hoc or temporary network that supports vehicle to vehicle or vehicle to infrastructure communication. Nowadays due to the exponential rise in road traffic and accidents, it is necessary to have... more

Background & Objective: Vanet is ad-hoc or temporary network that supports vehicle to vehicle or vehicle to infrastructure communication. Nowadays due to the exponential rise in road traffic and accidents, it is necessary to have information about vehicle position, speed, direction, lane etc. that aware us from traffic, road condition etc. to avoid accidents. Research has been going on in the field of traffic congestion problem, mobility model and Intelligent Transportation System (ITS). To solve this complex problem a traffic simulator and a realistic scenario is needed but the issue is generating a realistic traffic scenario. Current work is focussed in this direction for building a realistic scenario of an area. Conclusion: In the current work, a realistic simulation in VANET is described and SUMO traces are integrated on network simulator-NS3.

Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous... more

Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad hoc networks pose a number of challenges for the implementation of security infrastructure in the wireless network system design. In this paper, we study the ad-hoc architecture thus understanding the vulnerabilities and security goals. Further, we discuss the various security attacks and explore approaches to secure the communication.

Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are connecting each other through wireless network. It includes several routing protocols specifically designed for ad-hoc... more

Mobile Ad-hoc networks are categorized by multi-hop wireless connectivity and numbers of nodes are
connecting each other through wireless network. It includes several routing protocols specifically designed
for ad-hoc routing. The most widely used ad hoc routing protocols are Ad-hoc On Demand Distance Vector
(AODV), Destination Sequence Distance Vector (DSDV), and Dynamic Source Routing (DSR). In this
paper, we present an analysis of DSR protocol and propose our algorithm to improve the performance of
DSR protocol by using small delay applied on last route ACK path when an original route fails in Mobile
Ad Hoc networks. Past researchers the MANET have focused on simulation study by varying network
parameters, such as network size, number of nodes. The simulation results shows that the M-DSR protocol
having some excellent performance Metrics then other protocols. We have taken different performance
parameters over the comparison of Modified -DSR with other three protocols in mobility as well as Non-
mobility scenario up to 300 nodes in MANETs using NS2 simulator. To achieve this goal DSR is modified
by using modified algorithm technique in order to load balancing, to avoid congestion and lower packet
delivery.

In mobile ad hoc networks, the absence of infrastructure and the consequent absence of authorization facilities impede the usual practice of establishing a practical criterion to distinguishing nodes as trusted and distrusted. Since all... more

In mobile ad hoc networks, the absence of infrastructure and the consequent absence of authorization facilities impede the usual practice of establishing a practical criterion to distinguishing nodes as trusted and distrusted. Since all nodes in the MANETs would be used as router during working period, secure routing protocols have vital rule in the security of the network. So evaluating the performance metrics of secure routing protocols and calculating the overhead of security design is very important in network engineering. In this paper the effects of Black hole attack on two different types of routing, OLSR as proactive routing protocol and AODV as reactive routing protocol are considered. In addition, the performance metrics of ordinary routing protocols (AODV and OLSR) are compared with a new secure routing protocol MAODV, in which neighbors of node help him to distinguish a trusted node. Finally, the simulation results show that the end-to-end delay of a network under black hole attack with different type of routing protocols, AODV, OLSR and MAODV. The simulation results illustrate good comparison of network performance parameters for different conditions such as node mobility and number of nodes.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

In mobile ad hoc networks, the absence of infrastructure and the consequent absence of authorization facilities impede the usual practice of establishing a practical criterion to distinguishing nodes as trusted and distrusted. Since all... more

In mobile ad hoc networks, the absence of infrastructure and the consequent absence of authorization facilities impede the usual practice of establishing a practical criterion to distinguishing nodes as trusted and distrusted. Since all nodes in the MANETs would be used as router during working period, secure routing protocols have vital rule in the security of the network. So evaluating the performance metrics of secure routing protocols and calculating the overhead of security design is very important in network engineering. In this paper the effects of Black hole attack on two different types of routing, OLSR as proactive routing protocol and AODV as reactive routing protocol are considered. In addition, the performance metrics of ordinary routing protocols (AODV and OLSR) are compared with a new secure routing protocol MAODV, in which neighbors of node help him to distinguish a trusted node. Finally, the simulation results show that the end-to-end delay of a network under black hole attack with different type of routing protocols, AODV, OLSR and MAODV. The simulation results illustrate good comparison of network performance parameters for different conditions such as node mobility and number of nodes.

Today wireless communications is becoming the most useful means of transferring data, and the most active research sector. In this I will demonstrate one of the most useful types of the Ad-Hoc networks; the Vehicular Ad-Hoc Networks.... more

Today wireless communications is becoming the most useful means of transferring data, and the most active research sector. In this I will demonstrate one of the most useful types of the Ad-Hoc networks; the Vehicular Ad-Hoc Networks. VANET is the sort of technology of constructing an Ad-Hoc network with resilience between vehicles and each other, as well as, between mobile vehicles and with all roadside unit additionally. To facilitate the communication between automobiles, a special type of MANET known as VANET has been developed. Using realistic vehicle mobility models, we develop VANET simulators and models for representing vehicle communication and mobility. This test necessitates the use of both a traffic and network simulator. However, because it is simple, easy, and inexpensive, the MATLAB has been preferred to the traffic simulation. An urban scenario Vehicular Ad-Hoc Network (VAN) simulation is the goal of this paper, which can be used for testing. MAC protocols in VANETs can benefit from this type of environment.

A novel infrastructureless mobile networks (MANETs) is a collection of wireless nodes that can dynamically form a network to exchange information. The special features of MANET bring this technology great opportunity together with severe... more

A novel infrastructureless mobile networks (MANETs) is a collection of wireless nodes that can dynamically form a network to exchange information. The special features of MANET bring this technology great opportunity together with severe challenges. This paper describes the fundamental problems of ad hoc networking by giving its related background including the concept, features, applications, issues of MANETs, investigates and presents recent research trends and identifies Simulators for MANETs[5]. Based on recent research interests of scholars we found that some issues such as routing and power management attracted much attention and issues such as IP addressing and fault tolerance will have wide scope in the future. In the qualitative analysis [5], we found that some factors such as scalability, stability, and reliability attracted much. The essential simulation metrics for various MANET issues are identified and Simulators are listed for experiment. The analysis results demonstrate the utilization trends for various MANET simulators.

Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols in wireless sensor... more

Wireless sensor network are emerging in various fields like environmental monitoring, mining, surveillance system, medical monitoring. LEACH protocol is one of the predominantly used clustering routing protocols in wireless sensor networks. In Leach each node has equal chance to become a cluster head which make the energy dissipated of each node be moderately balanced. We have pioneered an improved algorithm named as Novel Leach based on Leach protocol. The proposed algorithm shows the significant improvement in network lifetime .Comparison of proposed algorithm is done with basic leach in terms of network life time, cluster head selection, energy consumption, and data transmission to base station. The simulation results shows that proposed algorithm can reduce network energy consumption and prolong network life commendably. Simulation of our protocol is done with Matlab.

The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more

The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.

This paper describes about the computing environment and types of network used and various others existed possible networks available for certain purpose and can be used in the computer network environment. As everyone knows about the... more

This paper describes about the
computing environment and
types of network used and
various others existed possible
networks available for certain
purpose and can be used in the
computer network
environment. As everyone
knows about the computer
network, basically it is a
collection of computer machine,
servers, network devices,
mainframes or any devices
which has the capacity or
features of connecting to each
other and can form a network.
Minimum two machines or device can be connected and
can be said as a computer network. Now this network is
capable to share information or data within the connected
devices or networks only. Its best suited example can be
internet where many more than the million peoples are
confined within the networks and exchange data or
information worldwide in fractions of seconds on a single
click of computer keyboard. Often we see and use widely
in the applications of cloud computing and cyber crimes
and security concern.

The aim of this final course project is to elucidate what a wireless mesh network is, its applications, its relevance in the setting of wireless networks, and especially to explain how a wireless mesh network is built and describe the... more

The aim of this final course project is to elucidate what a wireless mesh network is, its applications, its relevance in the setting of wireless networks, and especially to explain how a wireless mesh network is built and describe the equipments needed to assemble a mesh network.
It represents a broken paradigm in wireless networks, because the AP and client station have the ability to perform more than one function. A necessary evolution happens by the increasing demand of mobile Internet, driven by the fast increase of devices using IP services, such as smartphones, tablets, smart TVs, notebooks, and even home appliances such as microwaves and refrigerators may have services that require the use of the Internet.
This scene symbolizes the IP dominance with the integration of services over the Internet. And for all of this can be able to be realized, the networks must have high capacity, reliability and often applicable in hazardous environments. In this scenario wireless mesh networks fit, an evolution in the construction of wireless networks, which is capable of deliver a high capacity for Wi-Fi ( Wireless Fidelity) services. The IEEE 802.11 S standard describes wireless mesh networks.
In order to better understand the operation of the wireless mesh network, it is necessary to know the wireless networks standard IEEE 802.11 and the adhoc networks. Then we show the infrastructure and architecture characteristics of these networks, besides the features present in the physical and data link layer operations of traditional wireless networks IEEE 802.11. Then we describe the wireless mesh network characteristics, ending with the systematization of a dimensioning project for this network.

Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing... more

Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing popularity of the TCP/IP stack. Since it was originally designed for controlled serial lines, Modbus does not have any security features. In this paper, we wrote several benchmarks to evaluate the performance of networking devices that run Modbus TCP. Parameters reported by our benchmarks include: (1) response time for Modbus requests, (2) maximum number of requests successfully handled by Modbus devices in a specific amount of time, and (3) monitoring of Modbus devices when suffering a Distributed Denial of Service attack. Due to the growing adoption of IoT technologies, we also selected two widely known and inexpensive development boards (ESP8266 and Raspberry Pi 3 B+/OpenPLC) to realize a performance evaluation of Modbus TCP.

This paper simulates and investigates the performance of four widely-used channel estimation techniques for MIMO-OFDM wireless communication systems; namely, super imposed pilot (SIP), comb-type, space-time block coding (STBC), and... more

This paper simulates and investigates the performance of four widely-used channel estimation techniques for MIMO-OFDM wireless communication systems; namely, super imposed pilot (SIP), comb-type, space-time block coding (STBC), and space-frequency block coding (SFBC) techniques. The performance is evaluated through a number of MATLab simulations, where the bit-error rate (BER) and the mean square error (MSE) are estimated and compared for different levels of signal-to-noise ratio (SNR). The simulation results demonstrate that the comb-type channel estimation and the SIP techniques overwhelmed the performance of the STFC and STBC techniques in terms of both bit-error rate (BER) and mean square error (MSE).

In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on... more

In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.

org/ncwc/index Scope & Topics 8 th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing... more

org/ncwc/index Scope & Topics 8 th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Computer Science & Engineering.

— In Computer Aided Decision(CAD) systems, machine learning algorithms are adopted to assist a physician to diagnose disease of a patient. The purpose of this study is to improve the prediction accuracy on medical datasets by hybridizing... more

— In Computer Aided Decision(CAD) systems, machine learning algorithms are adopted to assist a physician to diagnose disease of a patient. The purpose of this study is to improve the prediction accuracy on medical datasets by hybridizing machine learning algorithms. In this paper Hybrid Machine Learning algorithm is proposed using two supervised algorithms, Naïve Bayes and JRIP. The methodology adopted in this paper for proposing new Hybrid Machine Learning Algorithm is implemented by using R programming language and weka software tool. Further, comparative study is made between individual algorithms and proposed hybrid algorithm to prove the improvement in prediction accuracy on medical datasets. The proposed algorithm shows enhanced performance compared to the individual classifiers and assist the physician in diagnosis.

Use of proxy server could help in providing adequate access and response time to large numbers of World Wide Web (WWW) users requesting previously accessed page. The result of the study showed that hit ratios of the proxy servers range... more

Use of proxy server could help in providing adequate access and response time to large numbers of World Wide Web (WWW) users requesting previously accessed page. The result of the study showed that hit ratios of the proxy servers range from 21% to 39% for large organization (More number of Users) 40% to 70% for medium organizations (medium number of users) and over 70% of web pages are dynamic. The study indicates the effectiveness of the proxy server and helps to evaluate the trade-off between money spent on higher bandwidth lower latency connections, versus the cost/performance of using caching intermediary.

8th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless... more

8th International Conference of Networks, Communications, Wireless and Mobile Computing
(NCWC 2022) looks for significant contributions to the Computer Networks, Communications,
wireless and mobile computing for wired and wireless networks in theoretical and practical aspects.
Original papers are invited on computer Networks, network protocols and wireless networks, Data
communication Technologies, network security and mobile computing. The goal of this
Conference is to bring together researchers and practitioners from academia and industry to focus
on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in
the areas of Computer Science & Engineering.

The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more

The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.

8th International Conference of Networks, Communications, Wireless and Mobile Computing (NCWC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless... more

8th International Conference of Networks, Communications, Wireless and Mobile Computing
(NCWC 2022) looks for significant contributions to the Computer Networks, Communications,
wireless and mobile computing for wired and wireless networks in theoretical and practical aspects.
Original papers are invited on computer Networks, network protocols and wireless networks, Data
communication Technologies, network security and mobile computing. The goal of this
Conference is to bring together researchers and practitioners from academia and industry to focus
on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in
the areas of Computer Science & Engineering.

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more

The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.

Wireless home automation systems have drawn considerable attentions of the researchers for more than a decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis, Bluetooth, WiFi, and ZigBee. Among... more

Wireless home automation systems have drawn considerable attentions of the researchers for more than a decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis, Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular because of its low cost and low power consumption. In this paper ZigBee based wireless home automation systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless home automation system has been presented. The performances of the ZigBee based systems have also been compared with those of other competing technologies based systems. In addition some future opportunities and challenges of the ZigBee based systems have been listed in this paper.

8th International Conference on Networks & Communications (NWCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and... more

8th International Conference on Networks & Communications (NWCOM 2022) will
provide an excellent international forum for sharing knowledge and results in theory,
methodology and applications of Computer Science, Engineering and Information Technology.
The Conference looks for significant contributions to all major fields of the Computer Science,
Engineering and Information Technology in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate
research results, projects, surveying works and industrial experiences that describe significant
advances in the following areas, but are not limited to

The rise of the new paradigm (Quantum computing) in the recent years have created a major security challenge to classical and widely used primitive cryptography schemes such as ECC (Elliptic Curve Cryptography) and RSA... more

The rise of the new paradigm (Quantum computing) in the recent years have created a major security challenge to classical and widely used primitive cryptography schemes such as ECC (Elliptic Curve Cryptography) and RSA (Rivest-Shamir-Adleman) Algorithm. These classical computing algorithms depend on the problems of discrete logarithm and integer factorization respectively. Recent advancements in quantum computing have made encryption schemes more vulnerable since they are weak to some quantum attacks, like Shor's Algorithm and Grove's Algorithm. Therefore the call for a new set of algorithms known as Post-Quantum cryptography (PQC) that would not be vulnerable to quantum attacks is imminent. NIST haven selected some candidates in the second round of Post-Quantum Cryptographic algorithms standardization project. This work's goal is to review these algorithms under there types. A rigorous survey on each Post-Quantum Cryptography schemes and their underlying properties will be x-rayed while recommending areas for research in this new security paradigm.

it s about an adhoc simulations

Wireless communication is the most effective communication to convey audio or video information among the population. It enables the masses to connect throughout the world. Wireless technologies improve the lifestyle of individuals in... more

Wireless communication is the most effective communication to convey audio or video information among the population. It enables the masses to connect throughout the world. Wireless technologies improve the lifestyle of individuals in rural and poor communication areas. In this view, the quality of a reliable signal can be enhanced by minimizing carrier interference. In this paper bit error rate of an image, signal is transmitted over fading channel is analyzed using orthogonal frequency multiplexing and channel estimation technique. An Orthogonal Frequency Multiplexing (OFDM) provides prominent bandwidth effectiveness and improved immunity to the fading environments. In OFDM, the data is modulated using multiple numbers of subcarriers that are orthogonal to each other. A cyclic prefix is infixed between OFDM symbols to annihilate the inter symbol interference (ISI) and inter-carrier interference (ICI). The least square channel estimation method is used to minimize the effect of multipath fading. An image, signal is modulated using BPSK, QPSK, 16QAM and 64QAM digital modulation schemes with OFDM and channel estimation and transmitted over AWGN and fading channel. The objective of this work is to improve the signal to noise ratio by reducing interference. The bit error rate vs. signal to noise ratio for BPSK, QPSK, 16QAM and 64QAM without channel estimation at 5dB is 0.4948, 0.4987, 0.4965 and 0.4983 and with channel estimation is 0.099, 0.2600, 0.3900 and 0.4300 respectively. The bit error rate obtained with BPSK, QPSK, 16QAM and 64QAM without channel estimation at SNR of 10dB is 0.4964, 0.4985, 0.4957 and 0.4982 and with channel estimation is 0.033, 0.19, 0.34 and 0.38 respectively. The bit error rate obtained with BPSK, QPSK, 16QAM and 64QAM without channel estimation at SNR of 15dB is 0.4938, 0.4985, 0.4953 and 0.4979 and with channel estimation is 0.0072, 0.1900, 0.3241 and 0.3762 respectively. The error rate is minimized with channel estimation. The error rate increases with the order of modulation and it is noticed that the error rate is minimum with the BPSK modulator and is maximum with 64QAM.

Underwater wireless communication networks (UWCNs) are constituted by sensors and autonomous underwater vehicles (AUVs) that interact to perform specific applications inside water. Commonly used Electromagnetic waves are not suitable as... more

Underwater wireless communication networks (UWCNs) are constituted by sensors and autonomous underwater
vehicles (AUVs) that interact to perform specific applications inside water. Commonly used Electromagnetic waves are not
suitable as the physical layer technology for UWCNs due to high path losses and larger antenna size. Most widely accepted
physical layer technology for UWCNs is acoustic waves. But they are adversely affected by ambient noise, multipath
propagation, and fading. In order to overcome these difficulties a new alternative technology for physical layer is needed.
Magnetic induction (MI) is a promising technique for UWCNs that is not affected by large propagation delays, multipath
propagation, and fading. The transmitter and receiver can be implemented by simple coils of wire. The transmission of
information is done through alternating magnetic field generated by the coils. MI have less path loss and Bit Error Rate
compared to other technique up to a particular transmission range. By using sufficient number of relay coils or repeaters in
between the transmitter and the receiver the transmission range can be increased. The power consumption and size of MI
transceiver are very small compared to other technologies. Magnetic induction techniques provide smooth transmission
through air water interface. So Communication between AUVs and docking stations, or control of AUVs from surface vessels
and shore is helpful in environmental and military applications. MI is strongly recommended as a physical transmission
technology for UWCN in both fresh water and sea water.

VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing protocols may be implemented to... more

VANET is a subset of MANET which offers communication between the nodes. VANET is a collection of various dynamic nodes that can change it and configure itself on the network. In Vanet, various routing protocols may be implemented to route the packet and Ad-hoc On-Demand Distance Vector (AODV) is one of the protocol that floods the packets to discover route. In Ad hoc On Demand Vector (AODV) routing protocol for VANET, malicious nodes may distrupt the network and make it difficult for the nodes to communicate. In this paper, AODV Routing Protocol is analysed in vanet with and without malicious attack. The malicious node disrupts the limit and floods the network with false packets. Malicious node will affect the performance of the entire network as it consumes more bandwidth and drops packets which in turn reduce the performance of AODV routing protocol and vanet.

"Technologies for Freedom" is a sentence in Manuel Castells’ "Communication and power"; they are intended as a "material basis and cultural movements in their struggle against capitalist globalization", and against the consequent... more

"Technologies for Freedom" is a sentence in Manuel Castells’ "Communication and power"; they are intended as a "material basis and cultural movements in their struggle against capitalist globalization", and against the consequent displacement of decision-making places from democratic instances.
In order to confirm the validity of this statement, this thesis initially wanted to develop a theoretical approach that would allow to compare the thought of some of the most important experts in the impact of digital technology on our society and, later, to verify its compliance in political upheaval that characterized the year 2011.
Trying not to be determinist, we have realized that many of the theories of authors like Bauman, Castells, John Friedmann, Hardt and Negri, Latouche, Mezza, Rheingold, Sassen, and others, could contribute to the definition of a single theoretical framework in which the digital, and particularly the Web 2.0, is actually helping to create a new man: today, as in italian Rinascimento, is no longer sufficient to stand on the nineteenth-twentieth century giants’ shoulders, but people claim to be an active participant in social, economic and political choices.
Beyond the obvious effect of "amplification of informations", there was evidence that three changes are characterizing people who are questioning the current arrangements of power, and any change has been associated with a precise method in digital social use:
· Disintermediation: Awareness of the failures of the short century and acquisition of
new sense of responsibility;
· User-generated content: Analysis and construction of a shared alternative; it consists in
the production of new meaning;
· Adhocracy: The action, the tendency to form spontaneous groups in the network, also
chasing minimum goals; fact that in 2011 took a lot more political characteristics.
Even using the parallelism between the movements of the 2001 Social Forum and those of 2011, steps were taken to see if what is proposed is theoretically then actually occurred in the Arab Springs protests, in the indignados and Occupy Wall Street movements. To verify this statement has been used the comments that journalists, writers and bloggers produced for networks and web.
The conclusion of the thesis is that the dynamics that made the 2011’s protesters occupy the squares of Arab and Western worlds are not detectable in the protests of previous years, except for the first period of the 2001 Social Forum, characterized by spirit of Genoa: the horizontality of the decisions taken both at birth and in the management of movements, refer to the three steps described above.

Statistics indicate that most road accidents occur due to a lack of time to react to instant traffic. This problem can be addressed with self-driving vehicles with the application of automated systems to detect such traffic events. The... more

Statistics indicate that most road accidents occur due to a lack of time to react to instant traffic. This problem can be addressed with self-driving
vehicles with the application of automated systems to detect such traffic events. The Autonomous Vehicle Navigation System (ATS) has been a
standard in the Intelligent Transport System (ITS) and many Driver Assistance Systems (DAS) have been adopted to support these Advanced Autonomous Vehicles (IAVs). To develop these recognition systems for automated self-driving cars, it's important to monitor and operate in real-time traffic events. It requires the correct detection and response of traffic event an automated vehicle. In this paper proposed to develop such a system by applying image recognition to detect and respond to a road blocker by means of real-time distance measurement. To study the performance by measuring accuracy and precision of road blocker detection system and distance calculation, various experiments were conducted by using Shalom frame dataset and detection accuracy, precision of 99%, 100%, while distance calculation 97%, 99% has been achieved by this approach.

Hər bir marşrutlama protokolu müxtəlif vəziyyətlərdə fərqli nəticələr göstərməkdədir. Bu məqsədlə bugünə qədər mövcud olan və yeni təklif olunmuş marşrutlama protokollarının çeşidli mühitlərdə çox sayda təhlili aparılmışdır. Günümüzdə... more

Hər bir marşrutlama protokolu müxtəlif vəziyyətlərdə fərqli nəticələr göstərməkdədir. Bu məqsədlə bugünə qədər mövcud olan və yeni təklif olunmuş marşrutlama protokollarının çeşidli mühitlərdə çox sayda təhlili aparılmışdır. Günümüzdə mobil cihazların və hərəkətdə olan paylayıcıların sayının gündən-günə artması mövcud protokolların səmərəliliyinin azalmasına gətirib çıxarmışdır. Bu məqalədə qovşaq sıxlığı və qovşaq hərəkətliliyi parametrləri əsasında üç marşrutlama protokolunun təhlili aparılmış və qiymətləndirilmişdir.Təhlil nəticəsində müqayisə aparılmış marşrutlama protokolları arasında DSR (ing. Dynamic Source Routing) protokolu müəyyən hallarda və qiymətlərdə yaxşı nəticə göstərsə də, ümumi nəticəyə baxdıqda, ən yaxşı nəticə göstərən marşrutlama protokolunun AODV (ing. Ad-hoc On-Demand Distance Vector) olduğu müşahidə edilmişdir. Açar sözlər: Ad-hoc şəbəkəsi, AODV protokolu, DSR protokolu, WRP protokolu, qovşaq sıxlığı parametrləri. Giriş Ad-hoc şəbəkəsi stasionar infrastruktur və mərkəzləşdirilmiş idarəetmədən istifadə olunmadan, çoxaddımlı (ing. multi-hop) simsiz linklər üzərindən əməkdaşlıq yolu ilə bir-biriləri ilə əlaqə quran simsiz mobil qovşaqlar qrupudur. Bu növ şəbəkələrin istifadə sahəsi kimi bəzi mühitləri misal göstərmək olar, məsələn, zəlzələ və daşqın kimi təbii fəlakətlər zamanı xilasedici komandaların öz aralarında xüsusi bir şəbəkənin mövcudluğuna ehtiyac olmadan əlaqə qura bilmələri, müharibə şəraitində əsgərlər arasında taktiki məlumatların mübadiləsi və yaxud sahibkarların iclas və yığıncaqlarında biznes/iş məlumatlarının mübadiləsi üçün lazım olan mühitlər və s. Şəbəkəni yükləmədən məlumat paketlərinin çatdırılması üçün Ad-hoc şəbəkəsi dinamik və əlverişli sürətə sahib olmalıdır. LakinAd-hoc şəbəkələr yüksək mobillik və aşağı sürət xüsusiyyətlərinə malik olduqlarından marşrutlama protokollarına ehtiyac yaranmışdır [1]. Bu günə qədər Ad-hoc şəbəkələri üçün bir neçə marşrutlama protokolu təklif edilmişdir [2–4]. Bu protokolların istifadə etdikləri mexanizm əsasən üç qrupa bölünür: cədvəl əsaslı (ing. table-driven), tələb əsaslı (ing. on-demand) və ikisinin birləşməsi olan hibrid marşrutlama protokolları. Tələb əsaslı marşrutlama protokolları yalnız tələbat olduqda marşrut sorğusu göndərirlər,cədvəl əsaslı marşrutlama protokolları isə şəbəkənin bütün istiqamətlərində trafikin olub-olmamasından asılı olmayaraq marşrutlama məlumatını toplayıb saxlayırlar. Hibrid protokollar isə bu iki növ marşrutlama protokollarının üstün cəhətlərini özlərində birləşdirirlər. Bu mexanizm fərqliliklərinə görə son zamanlarda Ad-hoc marşrutlama protokollarının müxtəlif səmərəlilik göstəricilərinə görə müqayisələri aparılmışdır [5–7]. Bu müqayisələrdə müxtəlif vəziyyətlər, şəraitlər və ssenarilər nəzərə alınmışdır. Məlumdur ki, hər bir marşrutlama protokolu müxtəlif vəziyyətlərdə fərqli müsbət və mənfi nəticələr gösətərməkdədir. Lakin yaşadığımız dövrdə mobil cihazların sayının sürətlə artması, eyni zamanda cihazlarda HotSpot vasitəsilə şəbəkənin paylanması tələbatı sürətli şəkildə artmaqdadır. Sözügedən mühit simulyasiya edilərək mövcud protokolların davranışı tədqiq edilmiş və yaranmış yeni problemlərin həlli istiqamətində müxtəlif təcrübələr aparılmışdır. Bu məqalədə aparılmış təcrübələrin arasından yalnız qovşaq sıxlığına və qovşaq hərəkətliliyinə görə aparılmış təhlillər qiymətləndirilmişdir.Təcrübə nəticəsində göstərilmişdir ki, müqayisə aparılmış marşrutlama protokolları arasında DSR protokolu müəyyən hallarda yaxşı nəticə göstərsə də, ümumi nəticəyə baxdıqda, ən yaxşı nəticə göstərən marşrutlama protokolu AODV olmuşdur.

The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new... more

The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.

Node in wireless multihop networks requires cooperation from peer neighbours to relay packets towards intended destination in ensuring optimal rate of successful data transmission. However, willingness of node to cooperate cannot be... more

Node in wireless multihop networks requires cooperation from peer neighbours to relay packets towards intended destination in ensuring optimal rate of successful data transmission. However, willingness of node to cooperate cannot be guaranteed due to the need to conserve resources that compelling selfish behaviour. Thus, node forwarding behaviour needs to be evaluated to detect selfishness and enforce punishment. Ironically, accurate evaluation of node behaviour is commonly affected by false judgment due to stochastic perceptions of an observer node especially when it is done using single set of actions (SSA) approach. In this paper, we evaluate the effectiveness of an enhanced mechanism of SSA named Compare and Measure Selfishness Detection (CMSD) based on its promptness and accuracy elements in detecting selfish node. Catering several network scenarios, our analysis shows that the promptness element introduced in CMSD is able to provide more complete behaviour information at reasonable delay trade-off in comparison to SSA, which requires extra observation sessions and induce the need of getting global opinions to collect node behavioural history. In addition, by using CMSD, node behaviour can be identified more accurately and false judgment can be detected earlier as demonstrated using our proposed matrix of judgment. We also propose a general framework of an extended version of CMSD named CMSD with Evidence (CMSDE) and provide brief explanation.