scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Communication Systems in 2019"


Journal ArticleDOI
TL;DR: An in‐depth survey of state‐of‐the art proposals having tactile internet as a backbone for delay mitigation using 5G networks for future ultra‐reliable low‐latency applications such as Healthcare 4.0, Industry 4.

95 citations


Journal ArticleDOI
TL;DR: A compilation of the work on the SDN‐based VANET system as a whole, incorporating its architecture, use‐cases, and opportunities, is still inadequate and the taxonomy of SDVN is presented based on the architecture modes, protocols, access technologies and opportunities with trending technologies.

83 citations


Journal ArticleDOI
TL;DR: An enhanced symmetric key‐based authentication protocol for IoT‐based WSN has been presented that has the ability to counter user traceability, stolen verifier, and DoS attacks and has the same communication cost as the baseline protocol.

74 citations


Journal ArticleDOI
TL;DR: This paper supports the use of the movement information and the residual energy level of each UAV to guarantee a high level of communication stability while predicting a sudden link breakage prior to its occurrence.
Abstract: Much progress can be expected in the domain of unmanned aerial vehicle (UAV) communication by the next decade. The cooperation between multiple UAVs in the air exchanging data among themselves can naturally form a flying ad hoc network (FANET). Such networks can be the key support to accomplish several kinds of missions while providing the required assistance to terrestrial networks. However, they are confronted with many challenges and difficulties, which are due to the high mobility of UAVs, the frequent packet losses, and the weak links between UAVs, all affecting the reliability of the data delivery. Furthermore, the unbalanced energy consumption may result in earlier UAV failure and consequently accelerate the decrease of the network lifetime, thus disrupting the overall network. This paper supports the use of the movement information and the residual energy level of each UAV to guarantee a high level of communication stability while predicting a sudden link breakage prior to its occurrence. A robust route discovery process is used to explore routing paths where the balanced energy consumption, the link breakage prediction, and the connectivity degree of the discovered paths are all considered. The performance of the scheme is evaluated through a series of simulations. The outcomes demonstrate the benefits of the proposed scheme in terms of increasing the lifetime of the network, minimizing the number of path failures, and decreasing the packet losses.

64 citations


Journal ArticleDOI
TL;DR: It is concluded that the use of neural networks for financial prediction can deal with the continuous and categorical prediction variables and obtain good prediction results.

62 citations


Journal ArticleDOI
TL;DR: A detailed review of the recent state‐of‐the‐art multiobjective VM placement mechanisms using nature‐inspired metaheuristic algorithms in cloud environments and gives special attention to the parameters and approaches used for placing VMs into PMs.

59 citations


Journal ArticleDOI
TL;DR: The proposed approach explains how the management algorithm observes the network performance to guarantee the quality of the stereoscopic IPTV services, by measuring the performance of quality of service (QoS) parameters (delay, jitter, and packets loss) and quality of experience (QoE) metrics.
Abstract: Polytechnic University of Valencia, Grant/Award Number: PAID-15-11; Ministerio de Ciencia e Innovacion, Grant/Award Number: TEC2011-27516

56 citations



Journal ArticleDOI
TL;DR: This work proposes an NLOS detection method using recursive decision tree learning and shows that the constructed model has correctly detected 90% of both line‐of‐sight (LOS) and NLOS cases on the seven different indoor environments.

48 citations



Journal ArticleDOI
TL;DR: This paper reveals several weaknesses in the identity‐based key establishment protocol of Mohammadali et al (published in IEEE Trans Smart Grid, 2017), which is based on elliptic curves, and improves their protocol and proves its security in the random oracle model.

Journal ArticleDOI
Qi Jiang1, Yuanyuan Qian1, Jianfeng Ma1, Xindi Ma1, Qingfeng Cheng, Fushan Wei 
TL;DR: This work puts forward a user centric three‐factor authentication scheme for wearable devices assisted by cloud server that remedies the flaws of the protocol of Das et al but also meets desired security properties.

Journal ArticleDOI
TL;DR: This paper reviews systematically the nature‐inspired meta‐heuristic techniques in the SDN and demonstrates advantages and disadvantages regarded of the chosen nature‐ inspired meta‐ heuristic techniques and considers their algorithms metrics.


Journal ArticleDOI
TL;DR: A novel, intelligent forwarding–based stable and reliable data dissemination scheme to solve the problem of frequent disconnection during data delivery and improves the average PDR and throughput by 31.55% and 25.30%, respectively.




Journal ArticleDOI
TL;DR: In this article, the authors proposed a new strategy, which consists of data handling before dissemination process as the first step of the scheme, in which the original message is optimized in order to reduce the number of exchanged packets.
Abstract: Data dissemination in vehicular ad hoc network (VANET) is emerging as a critical area of research. One of the challenges posed by this domain is the reliability of connection, which depends on many parameters, such as the bandwidth consumption, transmission delay, and data quality of service (QoS). Dissemination of emergency messages is very critical since the network topology is changing frequently and rapidly, which leads to data loss. So, it is necessary to develop new protocols and enhance dissemination schemes in VANET to avoid more emergencies and hazards cases. In this regard, we have proposed a new strategy, which consists of data handling before dissemination process as the first step of our scheme. In this phase, the original message is optimized in order to reduce the number of exchanged packets. The second part of this proposition consists of constructing fast and stable clusters to improve the message delivery time and to procure efficient bandwidth consumption. This approach is based on a Fitness function, which takes into account different parameters such as the transmission period, the connectivity degree, the relative velocity, and the link lifetime validity. Since exchanging data in VANET is an important process, routing phase is proposed to perform data exchange among clusters. It is based on a rapid and real‐time heuristic (real‐time adaptive A* [RTAA*]). To evaluate the reliability of the proposed approach, an urban scenario is used with different simulation parameters. The simulation results show that our proposed approach presents a better stability and efficiency performance compared with the discussed approaches. The proposed approach improves the performance of cluster duration (5% − 25%), delivery rate (2% − 8%), and the overhead (5% − 35%) on average compared with the discussed approaches.

Journal ArticleDOI
TL;DR: The vision to connect everyday physical objects to the Internet promises to create the Internet of Things (IoT), which is expected to integrate the diverse technologies such as sensors, actuators, radio frequency identification, communication technologies, and Internet protocols.

Journal ArticleDOI
TL;DR: The aim of this study is to investigate the existing methods and describe the types of important issues and challenging problems that can be addressed in data collection in the VANET.

Journal ArticleDOI
TL;DR: A novel anonymous and unlinkable user authentication and key agreement scheme for TMISs using the elliptic curve cryptosystem (ECC) is suggested and it is demonstrated that the new scheme is more preferable considering both efficiency and security criteria.

Journal ArticleDOI
TL;DR: The use of patterns of magnetic field strength to formulate the fingerprint database is made to solve the problem of device dependence by devising an approach that can perform localization using various smartphones in a similar fashion.

Journal ArticleDOI
TL;DR: An efficient weighted trust‐based malicious node detection (WT‐MND) scheme that can detect malicious nodes in a clustered WSN and sustains its efficient characteristics without significant power consumption overheads is proposed.


Journal ArticleDOI
TL;DR: An intrusion detection scheme for the detection of routing attack in edge‐based IoT environment called as RAD‐EI is designed, which accomplishes around 95.0% “detection rate” and 1.23% ‘false positive rate’ that are notably better than other related existing schemes.

Journal ArticleDOI
TL;DR: This paper proposes a lightweight authentication and key agreement protocol, which can withstand the well‐known attacks and provide the anonymity feature, and analyzes the security of the protocol using both Automated Validation of Internet Security Protocols and Applications and random oracle model and demonstrates the superiority of the proposed protocol in comparison with the other protocols.

Journal ArticleDOI
TL;DR: An in‐depth analysis of various components that are used in trust‐based mechanism and techniques deployed in effective and efficient execution of task by the components are provided.

Journal ArticleDOI
TL;DR: This article designs a Software‐Defined Handover Management Engine (SDHME) to handle the handover control mechanism in 5G ultradense networks and demonstrates that, compared with the conventional LTE handover strategy, the proposed approach significantly reduces the hand over failure ratio and handover delay.