Computer Networks and Distributed Systems
Abbas Ali Khan; Dr. Mohammad Hanif Ali; Dr. A. K. M. Fazlul Haque; Chandan Debnath; DR. Md. Ismail Jabiullah
Volume 6, Issue 1 , February 2020, , Pages 9-18
Abstract
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main ...
Read More
A Detailed Exploration of usability statistics and Application Rating on short-range Wireless protocols Bluetooth (IEEE 802.15.1), ZigBee (IEEE 802.15.4), Wi-Fi (IEEE 802.11) and NFC (ISO/IEC 14443) has been performed that being representing of those prominent wireless protocols evaluating their main characteristics and performances in terms of some metric such as co-existence, data rate, security, power consumption, joining time are analyzed and presented. Furthermore, considering the file sharing, tag connection, payment method apply and security parameters, usability statistics, application rating and research output is also depicted so that one can easily identify the scope of the protocols, and can visualize the most trending and demandable wireless protocol. A deeply analyzed bar graph illustrates the most demandable wireless protocol . This can be applied in any user's work in the Wireless Network lab and also be implemented in any real-world applications for the appropriate components and devices among the protocols in proper fields.
Computer Networks and Distributed Systems
Gholamhossein Ekbatanifard; Omid Yousefi
Volume 5, Issue 2 , May 2019, , Pages 57-70
Abstract
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. ...
Read More
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmful attacks based on their social relationships with other things for their own gain at the expense of other IoT devices. This motivates us to work on the issue of how to estimate the trust of a service provider to avoid malicious service providers and select the best service provider. In this paper, a novel trust management model is proposed based on four properties. The model deals with attacks (especially on-off attacks) and considers service levels for services provided by each node. A method to provide different levels of services via SIoT devices, and a new trust assessment scheme are the contributions of this paper. We evaluated the proposed scheme with extensive simulations and the results show that the proposed model can effectively select the best service provider and cope with most trust related attacks.
Computer Networks and Distributed Systems
Mohsen Abdollahzadeh Aghbolagh; Mohammad Ali Pourmina
Volume 4, Issue 3 , August 2018, , Pages 155-166
Abstract
Body area networks is one of the types of wireless area networks which has been created to optimize utilizing hospital resources and for earlier diagnosis of medical symptoms, and ultimately to reduce the cost of medical care. This network like most of the wireless networks is without infrastructure ...
Read More
Body area networks is one of the types of wireless area networks which has been created to optimize utilizing hospital resources and for earlier diagnosis of medical symptoms, and ultimately to reduce the cost of medical care. This network like most of the wireless networks is without infrastructure and the embedded sensor nodes in the body have limited energy. Hence, the early power completion of the wireless nodes based on the transmission of messages in the network can disrupt the entire network. In this study, a fuzzy clustering based routing is presented to overcome the mention challenge. In this method, the sensor nodes are allocated to the nearest cluster, based on their distance from the cluster head node, and exchange information with the cluster-head at the near distances, and the cluster-head node, due to its high initial energy, can transmit data to the remote server. In this study, due to the movement of the person and the position shift in the sensor nodes and the distances between the cluster-head nodes, sensor nodes belonging to the clusters are also updated and placed in their proper cluster and the transmission of sensory messages was done with its nearest cluster- head node. Simulation results show that the proposed method can be better than other existing methods in and equal condition.
Computer Networks and Distributed Systems
Asghar Dolatabadi; Hamid Haj Seyyed javadi
Volume 2, Issue 2 , May 2016, , Pages 49-55
Abstract
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established ...
Read More
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conservation of communications, declaration, and key removal. The locations of nodes are not usually defined in the networks. When a secure connection is required they can be used by symmetrical or asymmetrical encodings. A node can just make secure connection, if they are in same radio range or have a common key. In dynamic wireless sensor networks compared with static networks the sensors are moveable and can be added or removed. This research makes an attempt to investigate the challenges of key management for encoding. It also tries to solve other remained problems in this field. Therefore, distribution and key management schemes supplying security and operational requirements of sensor networks are examined in fuzzy clustering and suitable protocol for key management.
Computer Networks and Distributed Systems
Ali Abbasi; Amir Masoud Rahmani; Esmaeil Zeinali Khasraghi
Volume 1, Issue 4 , November 2015, , Pages 1-14
Abstract
Abstract - One of the important problems in grid environments is data replication in grid sites. Reliability and availability of data replication in some cases is considered low. To separate sites with high reliability and high availability of sites with low availability and low reliability, clustering ...
Read More
Abstract - One of the important problems in grid environments is data replication in grid sites. Reliability and availability of data replication in some cases is considered low. To separate sites with high reliability and high availability of sites with low availability and low reliability, clustering can be used. In this study, the data grid dynamically evaluate and predict the condition of the sites. The reliability and availability of sites were calculated and it was used to make decisions to replicate data. With these calculations, we have information on the locations of users in grid with reliability and availability or cost commensurate with the value of the work they did. This information can be downloaded from users who are willing to send them data with suitable reliability and availability. Simulation results show that the addition of the two parameters, reliability and availability, assessment criteria have been improved in certain access patterns.
Computer Networks and Distributed Systems
Zahra Kamaei; Hamidreza Bakhshi; Behrooz Masoumi
Volume 1, Issue 3 , August 2015, , Pages 9-16
Abstract
Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery ...
Read More
Wireless Sensor Networks are the new generation of networks that typically are formed great numbers of nodes and the communications of these nodes are done as Wireless. The main goal of these networks is collecting data from neighboring environment of network sensors. Since the sensor nodes are battery operated and there is no possibility of charging or replacing the batteries, the lifetime of the networks is dependent on the energy of sensors. The objective of this research, is to combine the Harmony Search Algorithm and Ant Colony Optimization Algorithm, as successful meta heuristic algorithm to routing at wireless sensor to increase lifetime at this type of networks. To this purpose, algorithm called HS-ACO is suggested. In this algorithm, two criterion of reduction consumption of energy and appropriate distribution of consumption energy between nodes of sensor leads to increase lifetime of network is considered. Results of simulations, show the capability of the proposed algorithm in finding the Proper path and establishment appropriate balance in the energy consumed by the nodes. Propose algorithm is better than Harmony Search algorithm and Ant Colony Optimization algorithm and Genetic Ant algorithm.