Current Issue : April-June Volume : 2022 Issue Number : 2 Articles : 5 Articles
As a part of the smart city revolution, crowd management is an emerging trend and it can enhance the quality of life. Unmanned ariel vehicles (UAVs) can help in making the crowd management process more efficient and more accurate. UAVs can monitor and collect environmental-related surveillance data and share real-time information with each other and with the decision makers. However, the battery-operated UAVs communicate over the open public channel making the privacy and security of the UAVs a crucial element in mission-critical applications. +eweaknesses of the existing scheme pave the way to design a new lightweight authentication scheme for UAV environments. In this article, we present a symmetric key primitive-based scheme and provide authentication among a user and a UAV through an intermediate control center. Due to usage of symmetric key and elliptic curve cryptography, the proposed scheme fulfils the performance requirements of the UAVs.+esecurity of the proposed scheme is substantiated through BAN logic, along with a discussion on security features extended by the proposed scheme. +e performance and security comparisons show that the proposed scheme provides adequate security and efficiency and can be practically deployed in real UAV environments....
Networking is one of the major areas in which technology is running. Networking plays a vital role in communications for the past few decades. Nodes are the important connections in the network. One of the main parameters considered in the node is power. Power is limited for the nodes in MANET, which is used for some operations where the node energy is not exhausted. Power obligations always affect the systems which ultimately affects the connectivity in the network. Mobility and congestion of nodes are also affected by power problems which simultaneously have some effects like link failures, packet losses which lead some problems in QoS performance of the protocol. This research combines BEMRT (Balanced and Energy Efficient Multipath Routing) with Robust Transmission in MANET. This combination will help the network to survive the problems discussed above which depend on the route discovery mechanism FF-AOMDV. The proposed algorithm will increase the connectivity from end to end and also minimizes the errors at all. Neighbor node selection method is considered with efficient energy which generates multiple paths from source to destination. A stable path is found by the node with effective load balancing. The mechanism is simulated and the protocol FF-AOMDV is compared with AOMDV and AOMRLM with concerning PDR (packet delivery ratios), routing overhead, delay, energy consumption, network lifetime, and throughput....
IoT authentication involves not only people, but also things, requiring a universal authentication method. The core authentication technology is the subject authenticity proof, but the traditional proof method based on model reasoning or based on third party trust transferring cannot solve. Therefore, a truth authentication logic based on evidence is created. The Truth Logic is realized by digital signature, and proves the entity authenticity by identifier authentication and ontology authentication, forming a new concept of identifier authentication and proves the event authenticity by acceptance authentication and adoption authentication, where the acceptance authentication is composed of subject and ontology authentication, and the adoption authentication is composed of object authentication, because the acceptance process is always carried out before the acceptance process, thus forming a new concept of “proof before event”. Both entity authentication and event authentication are based on identifier authentication, so the GAP universal authentication protocol can be constructed to authenticate all entities in the Internet of Things and all events in the Internet of Events by single-step. As an example, GAP protocol gives the application on the network, a verifiable virtual network can be constituted by identifier authentication, proving traceability, preventing illegal access and DOS attack....
Distributed link-state routing protocols, including Open Shortest Path First (OSPF) and Intermediate System–Intermediate System (IS-IS), have successfully provided robust shortest path routing for IP networks. However, shortest path routing is inflexible and sometimes results in congestion on some critical links. By separating the control plane and the data plane, the centralized control of Software Defined Networking (SDN)-based approach possesses flexible routing capabilities. Fibbing is an approach that can achieve centralized control over a network running distributed routing protocols. In a Fibbing-controlled IP network, the controller cleverly generates fake protocol messages to manipulate routers to steer the flow of the desired paths. However, introducing fake nodes destroys the structure of the loop-free property of Loop-Free Alternate (LFA) that is used to achieve fast failure recovery in IP networks. This paper addresses this issue and presents a solution to provision routing paths so a Fibbing network can still apply LFA in the network. The proposed network jointly considers load-balanced and fast failure recovery. We formulate the problem as an integer linear programming problem. The numerical results reveal that the proposed method can provide 100% survivability against any single node or single link failure....
The purpose of this case study paper was to identify factors that Internet Protocol stakeholders consider as standing in the way of the transition to bigger, more secure and faster internet with virtually unlimited Internet Protocol address in Cameroon and was completed in two phases. Descriptive method was followed and two study instruments were designed and implemented, namely focus group interviews and questionnaire interviews. Both instruments were validated and implemented on a sample of (6) experts for the interviews and (115) for the questionnaire. The focus group data were analyzed using a thematic analysis technique, leading to the identification of six themes including lack of policies and incentives to promote IPv6 deployment at government level, many organizations are seeing IPv6 as an issue that will only affect them in the distant future and not looking at IPv6 technology as an innovation generation opportunity. Decisions on these issues need to change if IPv6 current status in Cameroon is to change. The findings were then validated in the final phase. This involved the deployment of a survey questionnaire to collect opinions of 115 IPv6 actors working in both public and private institutions in Cameroon. The results revealed that IPv6 was not sufficiently attended to by organizations in Cameroon. The study results may be of practical use for Government IT decision makers. A further and more comprehensive research into the topic is recommended....
Loading....