ISSN (Print): 2210-3279
ISSN (Online): 2210-3287
Download PDF Flyer
Open Access Funding
Promote Your Article
ISSN (Print): 2210-3279
ISSN (Online): 2210-3287
Aims & Scope
Scopus, ChemWeb, Google Scholar, J-Gate, CNKI Scholar, Suweco CZ, EBSCO, Ulrich's Periodicals Directory and JournalTOCs.
Submit Abstracts / Manuscripts Online
Animated Abstract Submission
Sing Kiong Nguang Dept. of Electrical and Computer Engineering The University of Auckland Auckland City New Zealand
View Full Editorial Board
Order Your Article Before Print
Self Archiving Policies
Instructions for Authors
Free Copies Online
Open Access Articles
Most Cited Articles
Advertise With Us
Most Accessed Articles
Most Popular Articles
Special Issue Submission
Trends in Security of Cloud Computing, Internet of Things Systems and Social Networking
Guest Editor(s): B. B. Gupta
Tentative Publication Date: January, 2016
Submit Abstract via Email
Cyber Security, Privacy and Forensics for Complex Systems
Guest Editor(s): B. B. Gupta
It was a pleasure for me to submit my research work to be published by Bentham Science. You have got a professional team who always keeps me updated with my paper progress.
I wish you all the best with such a team, and keep it up.
Welcome to the special issue on “Recent research in network security analytics” in
International Journal of Sensors, Wireless Communications and Control. With the ripeness
of network data and encroachment of security technologies, data analytics now-adays
plays a very significant role in our day-to-day lives. Internet is one of the leading
accomplishment of this epoch thus securing it is also a precedence.
International Journal of Sensors, Wireless Communications and Control is a peer reviewed
journal considers both theoretical and implementation based papers. Network
security and Data analytics is an important call for present society where information
technology and services pass through each facet of our lives. However, this is demanding to achieve, as technology
is changing at a rapid speed and our systems turn into ever more complex. We are gradually more dependent
upon such information and communications infrastructures, and the threats we face are organized and
exploit our dependency by the attackers or cyber criminals. Moreover, cyber space is considered as fifth battlefield
after land, air, water and space.
The aim of this issue is to provide insight mechanisms while handling data; provide conceptual understanding
of network security issues, challenges and mechanisms; develop basic skills of secure network architecture
and explain the theory behind the security of networks, analytics and different cryptographic algorithms.
It is to present the most recent challenges and developments in data analytics and networks. It also
provides a forum for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns, practical challenges encountered and the solutions adopted in these fields. Original
research papers and state of the art reviews will be accepted. We anticipate that the special issue will open
new entrance for further research and technology improvements in this important area.
In this regard, the first article is devoted to investigate that current wireless networks are based on unicast
routing protocol derived from wired networks. The purpose of this paper is to implement and evaluate opportunistic
routing protocols in new generation’s wireless network. This is a comparative study between two opportunistic
protocols, which are ExOR (Extremely Opportunistic Routing protocol) and SOAR (Simple Opportunistic
Adaptive Routing protocol). The main goal of this survey is to show the benefits required by using
opportunistic approach to optimize the new generation’s wireless networks operations and implemented the
most used protocols under MATLAB framework .
The second article proposed a defense model for wireless sensor network against worms attack based on
the concept of epidemic theory. This model basically focused on mechanism which can be used for protection
of sensor network against malware attack. They derived an expression for basic reproduction number this
helps in study of worm dynamics and development of control mechanism. The stability of network depends
on the value of basic reproduction number explained the worm free and endemic equilibrium. They also find
the threshold value of communication radius and node density. Correlate the basic reproduction number and
threshold value of communication radius and study its impact in the design of wireless sensor network. Explain
the effect of quarantine and recovery on the infectious nodes with the variation of parameters and
showed that if the rate of recovery increases the number of infected nodes decreases. The quarantine class of
nodes helps in controlling of worm spread in the wireless sensor network. The proposed model is efficient in
comparison to existing model proved by simulation. This is a good idea for the development of an antivirus
for wireless sensor network against worm attack .
The third article focuses on the infrastructure less operating mechanism of MANETs is leading to their
popularity and extending their role in the operations of certain real-time applications as well as certain multi- media applications. For MANETs being able to support such applications, the prime requirement is to support
efficient routing as well as to incorporate efficient QOS mechanisms. This guides multiple research trends
towards MANET for categories like: QOS (Quality of Service), efficient Routing etc. The approach proposed
in this paper centers on the methods that can overcome the limitations faced by the Zone Routing Protocol
when used for large networks and improve QOS thus making the use of MANET in real time applications
feasible. The proffered scheme combines the advantages provided by aggregation of routes, introduce a central
entity and optimize QOS based network performance. The algorithm divides the zones into bigger zones
within the network and appoints a Zone Head node for each newly formed bigger zone which is a collection
of nodes bigger than a ZRP zone with Zone Head as the central administrator. It then aggregates the routes at
the Zone Head which works as a central entity and routes the traffic into the cluster by the help of Route aggregation
mechanism thus, enhancing ZRP performance .
In the ever evolving field of software engineering the quality and predictability of success for a project has
been of concern for Project Managers. The next article focused on this concern by proposing certain mathematical
models, designated as process performance models (PPMs), which enhance the process improvement
and improves predictability factor for a project success. Mathematical model selected can be like Queuing
Theory, Time Series, Fuzzy logic etc. based on problem specified and nature of industry data. This PPMs approach
can lead to solution for similar problems and avoids rebuilding solution every time.
The benefit which accrues with design of PPM is the ability to predict and tune the parameters affecting
performance of the project to achieve desired result. The building of these PPMs for various real life project
situations has not been attempted by industry on a large scale. In case a model does not achieve the performance
levels as specified by the project or baselines for similar projects, the model is rejected. In the real life
problem discussed, authors work out Success of a given project based on Bayesian solution for a given network
problem. Also, the authors demonstrate how to assess process capability. The solution shows that it is
possible to display a network problem with non-numeric data by a relationship among variables as parentchild
in a tree structure. The solution is based on developing conditional probability tables. PPMs can be developed
for different emerging application areas like Cloud computing, e-Governance, Application Service
Maintenance etc. and a library of models can be created by an IT company. The relevant model can be selected
by a Manager from this Library. The authors opine that in future, building PPMs may become a necessity
in High Maturity IT Organizations.
The last article explored that RF energy harvesting is getting popular in research community because it
provides useful electrical energy source for wireless sensor network applications. Its popularity is due to its
physically separated power transmitter and power receiver topology. Although the energy received using the
RF energy transfer has its own limitation of distance from the RF power transmitter but this technology provides
enough power and energy to run an ultra-low power electronics circuits. Ambient RF sources (e.g. BTS
towers, TV towers, Radio towers, Wi-Fi sources etc.) also motivate the researchers to develop RF energy
harvesters which easily match with RF sources and starts to convert RF energy into useful electrical energy.
In this article, multiple experiments have been performed over the RF energy harvesters on the base of number
of stages of multiplier, matching networks, and equivalent practical resistive load. Different stages of RF
energy harvester have been implemented and optimized. The optimization of the RF energy harvester has
been performed using the inductor and capacitor circuit used in matching network .The circuit is optimized
in terms of return power loss (S11) and total overall efficiency. In this article, the voltage multiplier is investigated
without inductor and capacitor matching network due to which maximum efficiency of 60% at 12dBm
is achieved at 9th stage of voltage multiplier and only 5% at -15dBm. Matching network with inductor (L) and
capacitor (C) has been developed to achieve better S11 and efficiency. The maximum S11 of -49dB achieved
for 3rd stage voltage multiplier while the efficiency at this value is less than 30% for -20dBm to 20dBm input
RF power range. The value of L and C for such case is 21.24nH and 6.9pF respectively. In the next experiment,
the efficiency is tried to get improved and the maximum efficiency of 3rd stage was 68% but this is
found that for this case the value of S11 is -2.4dB. For improved efficiency the value of L and C is 26.5nH
and 6.3pF, respectively. These results hold same theory for all stages of voltage multipliers. There is scope of
research by finding the value of efficiency and S11 by using fabricated modules of simulated RF energy har- vesters. The comparison with the simulated values may provide more authenticate results and new dimension
of designing of RF energy harvesters. The research helps the research community to design the more appropriate
RF energy harvester for their applications.
Finally, we would like to thank all the reviewers for their excellent work and the authors for their contribution.
We expect that International Journal of Sensors, Wireless Communications and Control will provide
the best platform for the authors and the readers, with a comprehensive overview of the most recent developments
in information management research.
In this special issue of “International Journal of Sensors, Wireless Communications and Control”, the
projection is to publish research contributions that significantly advance the state-of-the-art research, and
six research articles explore new designing techniques, methodologies, concepts and protocols.
Singh et al, presents a cloud based environment parameter monitoring system. Wireless Sensor Area
Network is developed using ZigBee and NodeMCU.
Mehta et al, analysed the benefits of Clustering when it comes to scalability and proposes an algorithm
using the clustering mechanism.
Sharma et al, examined the dataset PIDD (Pima Indian Diabetes dataset) for the model. Dataset was
trained offline using the predictive techniques SVM, Naive Bayes and K-NN. Performance analysis was
performed on the basis of response time and waiting time of a request.
Gerg et al, validated and analyzed the performance of our algorithm by using the CloudSim toolkit to
simulate the cloud environment.
Verma, focused on the second option to design an efficient RSA variant. An improved RSA variant is
designed by adding MultiPrime feature to Dual RSA on the decryption side to increase the decryption
Bazaz and Zafar, presented a technique of using GA based approach in cloud network for QOS optimization
of parameters like packet drop rate and hop count.
No Text Found