Most recent issue published online in the International Journal of Communication Networks and Distributed Systems.
International Journal of Communication Networks and Distributed Systems
http://www.inderscience.com/browse/index.php?journalID=261&year=2024&vol=30&issue=2
Inderscience Publishers Ltd
en-uk
support@inderscience.com
International Journal of Communication Networks and Distributed Systems
1754-3916
1754-3924
© 2024 Inderscience Enterprises Ltd.
© 2024 Inderscience Publishers Ltd
editor@inderscience.com
International Journal of Communication Networks and Distributed Systems
https://www.inderscience.com/images/files/coverImgs/ijcnds_scoverijcnds.jpg
http://www.inderscience.com/browse/index.php?journalID=261&year=2024&vol=30&issue=2
-
A network packet classification engine for real-time applications with enhanced performance
http://www.inderscience.com/link.php?id=137094
With the advancements in digital communication systems, security is one of the essential components of real-time communication systems. Packet classification is one of the most important networking tasks that helps to prevent hacking and unintended effects on connected devices. The slow processing speed of the router and other devices connected to it is an issue with real-time packet classification implementation. In this study, a brand-new architecture for packet classification in routers is put forth. The suggested design is capable of operating at high frequencies, which can satisfy the real-time requirements for networking applications. The proposed design uses low-area components with enhanced speed capabilities for higher energy efficiency. The design is implemented in both application-specific integrated circuits (ASICs) and field programmable gate array (FPGA) logic devices to validate the output. FPGA families, including the Virtex-4, 5, and 7 families, are used for synthesising in Xilinx software.
A network packet classification engine for real-time applications with enhanced performance
Midde Adiseshaiah; Maruvada Sailaja
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 115 - 135
With the advancements in digital communication systems, security is one of the essential components of real-time communication systems. Packet classification is one of the most important networking tasks that helps to prevent hacking and unintended effects on connected devices. The slow processing speed of the router and other devices connected to it is an issue with real-time packet classification implementation. In this study, a brand-new architecture for packet classification in routers is put forth. The suggested design is capable of operating at high frequencies, which can satisfy the real-time requirements for networking applications. The proposed design uses low-area components with enhanced speed capabilities for higher energy efficiency. The design is implemented in both application-specific integrated circuits (ASICs) and field programmable gate array (FPGA) logic devices to validate the output. FPGA families, including the Virtex-4, 5, and 7 families, are used for synthesising in Xilinx software.]]>
10.1504/IJCNDS.2024.137094
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 115 - 135
Midde Adiseshaiah
Maruvada Sailaja
Department of Electronics and Communication Engineering, Jawaharlal Nehru Technological University Kakinada, Kakinada, Andhra Pradesh-533003, India ' Department of Electronics and Communication Engineering, Jawaharlal Nehru Technological University Kakinada, Kakinada, Andhra Pradesh-533003, India
routing
packet classification
field programmable gate array logic
data security
2024-03-01T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
30
2
115
135
2024-03-01T23:20:50-05:00
-
A survey on wireless sensor network (applications and architecture)
http://www.inderscience.com/link.php?id=137085
Proliferation of the wireless sensor network is due to the advancement in wireless networks, information technologies, miniaturisation of sensors as well as convergence of MEMS technology, wireless communication and digital electronics. These wireless networks interface the physical world to the computing (virtual) world. In recent years, the availability of smaller, cheaper and intelligent sensors on a large scale has motivated the deployment of sensors in various applications such as smart city, smart home, smart grid, automated vehicles, etc. The sensor plays an important role in internet of things. This survey reports current research activities, applications, characteristics, architecture and case study of WSNs. In addition to this open research issues/problems are discussed. The aim is to present a comprehensive study of the literature on several aspects of wireless sensor network such as application and architecture.
A survey on wireless sensor network (applications and architecture)
Ranjan Kumar Mahapatra; Yajunath Kaliyath; N.S.V. Shet; Soumya Ranjan Mahapatro; Gnane Swarnadh Satapathi; Sankata Bhanjan Prusty; B. Shivalal Patro
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 136 - 201
Proliferation of the wireless sensor network is due to the advancement in wireless networks, information technologies, miniaturisation of sensors as well as convergence of MEMS technology, wireless communication and digital electronics. These wireless networks interface the physical world to the computing (virtual) world. In recent years, the availability of smaller, cheaper and intelligent sensors on a large scale has motivated the deployment of sensors in various applications such as smart city, smart home, smart grid, automated vehicles, etc. The sensor plays an important role in internet of things. This survey reports current research activities, applications, characteristics, architecture and case study of WSNs. In addition to this open research issues/problems are discussed. The aim is to present a comprehensive study of the literature on several aspects of wireless sensor network such as application and architecture.]]>
10.1504/IJCNDS.2024.137085
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 136 - 201
Ranjan Kumar Mahapatra
Yajunath Kaliyath
N.S.V. Shet
Soumya Ranjan Mahapatro
Gnane Swarnadh Satapathi
Sankata Bhanjan Prusty
B. Shivalal Patro
Department of Electronics and Communication Engineering, A J Institute of Engineering and Technology, Karnataka, India ' Department of Electronics and Communication Engineering, The National Institute of Engineering, Mysuru, Karnataka, India ' Department of Electronics and Communication Engineering, National Institute of Technology Karnataka, Surathkal, Karnataka, India ' School of Electronics Engineering, Vellore Institute of Technology, Chennai, India ' Department of Electronics and Communication Engineering, A J Institute of Engineering and Technology, Karnataka, India ' School of Electronics, Reva University, Bangalore, Karnataka, India ' School of Electronics, KIIT (Deemed to be University), Bhubaneswar, India
wireless sensor network
WSN
architecture
protocol
localisation
2024-03-01T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
30
2
136
201
2024-03-01T23:20:50-05:00
-
Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation
http://www.inderscience.com/link.php?id=137056
Software defined networks (SDNs) are emerging as the first choice for network administrators due to their agility, modularity and dynamism. Network operators can change the network topology, routes and other parameters as per their current requirement. Like traditional computer networks SDNs are also prone to various denial of service attacks (DDoS). Link flooding attacks are a class of DDoS attack that aims to choke crucial network connections and can fully detach the victim from the network. In this paper we have discussed two link flooding-based denial of service attacks, namely Coremelt and Crossfire, in the context of SDN along with the possible mitigation. These attacks are aimed at disconnecting services from the network. We demonstrate the usage of network function virtualisation along with SDN features to mitigate these attacks by recreating replicas of the services under attack and connecting them to the network.
Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation
Shariq Murtuza; Krishna Asawa
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 202 - 226
Software defined networks (SDNs) are emerging as the first choice for network administrators due to their agility, modularity and dynamism. Network operators can change the network topology, routes and other parameters as per their current requirement. Like traditional computer networks SDNs are also prone to various denial of service attacks (DDoS). Link flooding attacks are a class of DDoS attack that aims to choke crucial network connections and can fully detach the victim from the network. In this paper we have discussed two link flooding-based denial of service attacks, namely Coremelt and Crossfire, in the context of SDN along with the possible mitigation. These attacks are aimed at disconnecting services from the network. We demonstrate the usage of network function virtualisation along with SDN features to mitigate these attacks by recreating replicas of the services under attack and connecting them to the network.]]>
10.1504/IJCNDS.2024.137056
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 202 - 226
Shariq Murtuza
Krishna Asawa
Department of Computer Science Engineering and Information Technology, Jaypee Institute of Information Technology, Noida, India ' Department of Computer Science Engineering and Information Technology, Jaypee Institute of Information Technology, Noida, India
software defined networks
SDNs
network function virtualisation
NFV
denial of service attacks
DDoS
virtual network functions
VNFs
2024-03-01T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
30
2
202
226
2024-03-01T23:20:50-05:00
-
Asymmetric multi-period deep residual network face age estimation
http://www.inderscience.com/link.php?id=137079
Aiming at the problem that it is difficult for face age estimation to find features that accurately characterise face age changes, this paper proposes an asymmetric multi-period deep residual network face age estimation model. First, an asymmetric residual block is used to improve the feature extraction ability of the network model. Secondly, a multi-period residual structure is built to solve the optimisation problem caused by network deepening. Then, a shortcut connection that combines pooling and convolution is used to reduce the information loss of the shortcut layer. Finally, the age estimation method combining multi-classification and sequential regression is used to reduce the prediction error. Experimental results on three public datasets showed that the error (MAE/RMSE) of this model is reduced to 2.42/3.44, 3.38/4.69 and 5.17/7.34, respectively, which proved the effectiveness of the proposed algorithm.
Asymmetric multi-period deep residual network face age estimation
Yilihamu Yaermaimaiti; Yan Tian Xing; Tusongjiang Kari
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 227 - 242
Aiming at the problem that it is difficult for face age estimation to find features that accurately characterise face age changes, this paper proposes an asymmetric multi-period deep residual network face age estimation model. First, an asymmetric residual block is used to improve the feature extraction ability of the network model. Secondly, a multi-period residual structure is built to solve the optimisation problem caused by network deepening. Then, a shortcut connection that combines pooling and convolution is used to reduce the information loss of the shortcut layer. Finally, the age estimation method combining multi-classification and sequential regression is used to reduce the prediction error. Experimental results on three public datasets showed that the error (MAE/RMSE) of this model is reduced to 2.42/3.44, 3.38/4.69 and 5.17/7.34, respectively, which proved the effectiveness of the proposed algorithm.]]>
10.1504/IJCNDS.2024.137079
International Journal of Communication Networks and Distributed Systems, Vol. 30, No. 2 (2024) pp. 227 - 242
Yilihamu Yaermaimaiti
Yan Tian Xing
Tusongjiang Kari
School of Electrical Engineering, Xinjiang University, Urumqi, Xinjiang 830017, China ' School of Electrical Engineering, Xinjiang University, Urumqi, Xinjiang 830017, China ' School of Electrical Engineering, Xinjiang University, Urumqi, Xinjiang 830017, China
feature extraction
asymmetric convolution
shortcut connection
information loss
error
2024-03-01T23:20:50-05:00
Copyright © 2024 Inderscience Enterprises Ltd.
30
2
227
242
2024-03-01T23:20:50-05:00