scispace - formally typeset
Search or ask a question
JournalISSN: 1607-9264

Journal of Internet Technology 

Taiwan Academic Network
About: Journal of Internet Technology is an academic journal published by Taiwan Academic Network. The journal publishes majorly in the area(s): Computer science & Cloud computing. It has an ISSN identifier of 1607-9264. Over the lifetime, 1669 publications have been published receiving 7920 citations. The journal is also known as: Journal of internet technology & JIT (Online).


Papers
More filters
Journal ArticleDOI
TL;DR: Simulation results show that the proposed LARP outperforms the existing routing protocols in terms of packet delivery ratio and normalized routing overhead, and are expected to be of greater value than other existing solutions in underwater environment.
Abstract: As the network communications technology developing, a new type of networks has appeared in the daily life which is named underwater sensor networks (UWSNs). UWSNs are a class of emerging networks that experience variable and high propagation delays and limited available bandwidth. There are comprehensive applications in this area such as oceanographic data collection, pollution monitoring, offshore exploration, assisted navigation and so on. Due to the different environment under the ocean, routing protocols in UWSNs should be re-designed to fit for the surroundings. In particular, routing protocols in UWSNs should ensure the reliability of message transmission, not just decrease the delay. In this paper, we propose a novel routing protocol named Location-Aware Routing Protocol (LARP) for UWSNs, where the location information of nodes is used to help the transmission of the message. Simulation results show that the proposed LARP outperforms the existing routing protocols in terms of packet delivery ratio and normalized routing overhead. We expect LARP to be of greater value than other existing solutions in underwater environment.

384 citations

Journal ArticleDOI
TL;DR: This paper proposes an efficient mutual verifiable provable data possession scheme, which utilizes Diffie-Hellman shared key to construct the homomorphic authenticator and is very efficient compared with the previous PDP schemes, since the bilinear operation is not required.
Abstract: Cloud storage is now a hot research topic in information technology. In cloud storage, date security properties such as data confidentiality, integrity and availability become more and more important in many commercial applications. Recently, many provable data possession (PDP) schemes are proposed to protect data integrity. In some cases, it has to delegate the remote data possession checking task to some proxy. However, these PDP schemes are not secure since the proxy stores some state information in cloud storage servers. Hence, in this paper, we propose an efficient mutual verifiable provable data possession scheme, which utilizes Diffie-Hellman shared key to construct the homomorphic authenticator. In particular, the verifier in our scheme is stateless and independent of the cloud storage service. It is worth noting that the presented scheme is very efficient compared with the previous PDP schemes, since the bilinear operation is not required.

349 citations

Journal ArticleDOI
TL;DR: A novel design paradigm toward lightweight and tolerant authentication for service-oriented WMNs, named Variable Threshold-value Authentication (VTA) architecture, which can not only overcome the disadvantage of those static threshold value schemes, but also largely increase system cost comparing to the schemes not equipped with threshold mechanism.
Abstract: Wireless Mesh Networks (WMNs) play a very important role on "the last mile" in a variety of wireless network access with infrastructure support. It is necessary to provide guaranteed security while minimizing WMNs topology change by considering both rapid authentication of mobile terminals and demand for fast switch between different wireless networks. In this paper, we propose a novel design paradigm toward lightweight and tolerant authentication for service-oriented WMNs, named Variable Threshold-value Authentication (VTA) architecture. On one hand, VTA's intrusion-tolerant ability is ensured to design a series of node activated mechanisms to remain threshold values t and n of system private key unchanged. On the other hand, VTA changes threshold values t and n when nodes leave/join authentication server group. Analysis and simulation results show that VTA can not only overcome the disadvantage of those static threshold value schemes, but also largely increase system cost comparing to the schemes not equipped with threshold mechanism for WMNs.

298 citations

Journal Article
TL;DR: The detailed cloud computing service system based on big data, which provides high performance solutions for large-scale data storage, processing and analysis, is introduced.
Abstract: As one of the main development directions in the information field, big data technology can be applied for data mining, data analysis and data sharing in the massive data, and it created huge economic benefits by using the potential value of data. Meanwhile, it can provide decision-making strategies for social and economic development. Big data service architecture is a new service economic model that takes data as a resource, and it loads and extracts the data collected from different data sources. This service architecture provides various customized data processing methods, data analysis and visualization services for service consumers. This paper first briefly introduces the general big data service architecture and the technical processing framework, which covered data collection and storage. Next, we discuss big data processing and analysis according to different service requirements, which can present valuable data for service consumers. Then, we introduce the detailed cloud computing service system based on big data, which provides high performance solutions for large-scale data storage, processing and analysis. Finally, we summarize some big data application scenarios over various fields.

218 citations

Journal Article
TL;DR: This paper proposes a new routing protocol for geocasting called GeoGRID, which is based on the earlier unicast protocol GRID and is featured by utilizing location information, confining the flooding zone, and electing a special host in each grid area responsible of forwarding the geocasts.
Abstract: A mobile ad hoc network (MANET) is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. One prospective direction to use such networks is to adopt positioning devices (such as global positioning system, GPS) to provide location-aware services. This paper discusses an attractive service called geocasting, or location-based broadcasting, whose goal is to send a message targeted at mobile host resident within a specified geographical region (such as a building, a street, a commercial area, etc.). In this paper, we propose a new routing protocol for geocasting called GeoGRID, which is based on our earlier unicast protocol GRID [14]. The protocol is featured by utilizing location information, confining the flooding zone, and electing a special host in each grid area responsible of forwarding the geocast messages. Simulation results show that our GeoGRID protocol can reduce network traffic and achieve higher data arrival rate.

190 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202372
2022144
202136
2020158
2019196
2018183