scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Network and Computer Applications in 2013"


Journal ArticleDOI
TL;DR: Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.

1,102 citations


Journal ArticleDOI
TL;DR: This paper surveys different intrusions affecting availability, confidentiality and integrity of Cloud resources and services and recommends IDS/IPS positioning in Cloud environment to achieve desired security in the next generation networks.

799 citations


Journal ArticleDOI
TL;DR: This paper provides the taxonomy of various clustering and routing techniques in WSNs based upon metrics such as power management, energy management, network lifetime, optimal cluster head selection, multihop data transmission etc.

430 citations


Journal ArticleDOI
TL;DR: This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect and prevent intrusions in cloud computing systems.

369 citations


Journal ArticleDOI
TL;DR: The bi-directional effects between human and opportunistic IoT are characterized, the technical challenges faced by this new research field are discussed, and a reference architecture for developing opportunistic Internet of Things systems is proposed.

318 citations


Journal ArticleDOI
TL;DR: A temporal-credential-based mutual authentication scheme among the user, GWN and the sensor node and a lightweight key agreement scheme is proposed to embed into the protocol that is realistic and well adapted for resource-constrained wireless sensor networks.

287 citations


Journal ArticleDOI
TL;DR: A modified smart card based remote user password authentication scheme to overcome the weaknesses of Chen et al.'s scheme and shows that it is user friendly and more secure than other related schemes.

250 citations


Journal ArticleDOI
TL;DR: This paper presents the first classification method integrating static and dynamic features into a single test and concludes that to achieve acceptable accuracy in classifying the latest malware, some older malware should be included in the set of data.

233 citations


Journal ArticleDOI
TL;DR: This survey has revealed that network security has been an important research topic since the beginning and advanced methodologies, such as machine learning, have been very promising.

216 citations


Journal ArticleDOI
TL;DR: This paper compares and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them.

174 citations


Journal ArticleDOI
TL;DR: CoTEC (COperative Traffic congestion detECtion), a novel cooperative technique based on Vehicle-to-Vehicle (V2V) communications designed to detect road traffic congestion, is presented and evaluated under large-scale highway scenarios using iTETRIS.

Journal ArticleDOI
TL;DR: The taxonomy considers several aspects of the mobile applications space, including context awareness, client architectures, mobile user interfaces, as well as offered functionalities, highlighting functional, architectural, technological, and implementation issues.

Journal ArticleDOI
TL;DR: By doing qualitative comparison of routing protocols, it is observed that hybrid communication would be the better choice for both communication mode operable in either a city environment or an open environment.

Journal ArticleDOI
TL;DR: This paper presents WSN for rehabilitation supervision with a focus on key scientific and technical challenges that have been solved as well as interdisciplinary challenges that are still open, and believes that bridging researchers with different scientific backgrounds could have a significant impact on the development of WSN.

Journal ArticleDOI
TL;DR: This study surveys the existing position-based routing protocols and characterised the vehicular network environment, namely the urban and the highway environments, and characterises the main constrains to urban and highway environments.

Journal ArticleDOI
TL;DR: The results of the experiments show that the proposed algorithm reduces the false positive problems substantially with lower complexity and the impact of rescheduling the classifier algorithms in a multi-tier classification process to find out the optimum scheduling.

Journal ArticleDOI
TL;DR: In this work, the state of the art dynamic key management schemes are classified into different groups and summarized based on the evaluation metrics, and several basic evaluation metrics are introduced.

Journal ArticleDOI
TL;DR: This work considers service selection as an optimization problem and establishes a Particle Swarm Optimization (PSO)-based web service selection model with quality of service (QoS) constraints that can be used to address the horizontal adaptation issues from the composite web services.

Journal ArticleDOI
TL;DR: A general cooperation framework for cooperation on changing pseudonym can enhance anonymity and a Cooperative Pseudonym change scheme based on the number of Neighbors (CPN), and the anonymity of CPN in one-lane and multi-lane VANETs is investigated.

Journal ArticleDOI
TL;DR: A novel bee colony optimization algorithm called bees life algorithm (BLA) applied to solve the quality of service multicast routing problem (QoS-MRP) for vehicular ad hoc networks as NP-Complete problem with multiple constraints is proposed.

Journal ArticleDOI
TL;DR: A novel approach for automatic reverse engineering application-layer network protocols by extracting protocol keywords from network traces based on their support rates and variances of positions, reconstruct message formats, and infer protocol state machines is presented.

Journal ArticleDOI
TL;DR: A survey on the different interference and resource management techniques in Self-Organizing Network according to specifics classification criteria is provided to lessen the interference and increase the user capacity.

Journal ArticleDOI
TL;DR: This paper proposes a novel idea of an Active node based Fault Tolerance using Battery power and Interference model (AFTBI) in WSN to identify the faulty nodes using battery power model and interference model and found that AFTBI outperforms compared to the results of FDWSN.

Journal ArticleDOI
TL;DR: An intelligent home appliance control system uses an integrated ZigBee and Wi-Fi network architecture in the house and sends the ZigBee sensor messages to a cloud database through the TCP/IP protocol network containing the physical network and wireless network device lines.

Journal ArticleDOI
TL;DR: Two algorithms are proposed, first a novel job scheduling algorithm called Combined Scheduling Strategy (CSS) that uses hierarchical scheduling to reduce the search time for an appropriate computing node and a dynamic data replication strategy, called the Modified Dynamic Hierarchical Replication Algorithm (MDHRA) that improves file access time.

Journal ArticleDOI
TL;DR: The technical features of existing transport protocols are reviewed and a generic framework for a WSN transport protocol is suggested, which offers a strong groundwork for the new researchers to identify the open research issues.

Journal ArticleDOI
Yuhuai Peng1, Yao Yu1, Lei Guo1, Dingde Jiang1, Qiming Gai1 
TL;DR: This paper proposes a novel cross-layer QoS-aware routing protocol on OLSR (CLQ-OLSR) to support real-time multimedia communication by efficiently exploiting multi-radio and multi-channel method and demonstrates that the network aggregate throughput can almost be improved by 300% compared with the single radio case.

Journal ArticleDOI
TL;DR: A framework based on database schema redesign and dynamic reconstruction of metadata for the preservation of cloud users' data privacy is proposed, which is well aligned with the recommendations proposed by various Standards Development Organizations working in this domain.

Journal ArticleDOI
TL;DR: A solar energy-harvesting model is incorporated into SMAC and its performance analysis is conducted from a theoretical aspect and a new model based on queuing theory is developed to calculate the average number of energy packets in battery in terms of both duty cycle and throughput.

Journal ArticleDOI
TL;DR: This paper introduces a novel grid-based deployment metric, called Average Connectivity Percentage, in order to characterize the deployed network connectivity when sensor placements are subject to random errors around their corresponding grid locations.