Volume 1, Issue 1, December 2016

Ad-hoc and Opportunistic Routing in Dynamic Scatternet Environment
S K A Khan, M Adeel, M A Azam
AbstractIn reality, mobile ad-hoc networks are highly unpredictable because any node can join or leave the network at any time, thus making reliable and effective communication a problem. This issue is addressed by introducing new breed of ad-hoc networking, known as opportunistic networks. Opportunistic networking is a concept that has evolved from mobile ad-hoc networking. In opportunistic networks nodes have no prior knowledge of routes to intended destinations. Any node in the network can be used as potential forwarder with the exception of taking information one step closer to intended destination. The forwarding decision is based on the information gathered from the source node or encountering node. The opportunistic forwarding can only be achieved if message forwarding is carried out in store and forward fashion. Although, opportunistic networks are more flexible than traditional MANETs, however, due to little insight of network, it poses distinct challenges such as intermittent connectivity, variable delays, short connection duration and dynamic topology. Addressing these challenges in opportunistic network is the basis for developing new and efficient protocols for information sharing. This paper presents a conceptual study for opportunistic networks to improve the overall message delivery at destinations while keeping the communication cost very low. Some assumptions are considered to improved directivity of message flow towards intended destinations. These assumptions exploit human social relationships analogies such as popularity and use of hybrid communication by applying opportunistic concepts on top of traditional ad-hoc routing such as AODV to gain maximum message directivity. The experiment results have shown that by combining traditional ad-hoc routing with opportunistic forwarding has not only improved directivity but as a result have achieved a great improvement in message delivery to intended destinations.
Read More on Global Digital Library
ICN Framework and Its Challenges for IOT Applications
Syed Usman Jamil, Khalid Khan
AbstractThe early internet user needs were coped by current internet architecture that was based on host-centric communication model. Now a day, usage as well as requirements of internet is changed however mostly internet users are interested to access large amount of data/information regardless of physical location. This paradigm changes in the internet usage model along with mobility support, better security and pressing needs of users has invited researchers to consider radical changes in the internet architecture. By following this direction, we have reviewed many on-going efforts of researchers in which the future internet can be developed on the foundation of Information- Centric Networking.
To sync billions of objects over the internet is promised by the internet of things (IOT). To deploy numerous individual IOT architectures, in domains of diverse nature, the ongoing trend is to deploy a common IOT platform, so that objects may be accessible and synchronized with applications across domains and organizations. To achieve this goal, limited proposals are developed to model unified host centric IOT infrastructure operate at upper layer of current host centric internet. Therefore, fundamental mismatch is evident in between the today’s host centric nature of internet and IOT system having information centric nature. We propose to develop common set of services and protocols to resolve this mismatch, which form a platform for IOT, on the basis of ICN paradigm, which may be named as ICN-IOT platform. ICN-IOT merger is the ICN salient feature and therefore enables seamless scalability, mobility support and efficient service and content delivery.
The main aim of these investigations is to find out the core functionalities of ICN architectures, overview of IOT functionalities and architectural requirements, and the review of ICN over IOT implementations and their advantages and challenges to sketch out the key unresolved challenges in this field of networking research.

The Taxonomy of Behavioural Parameters on Mobile Devices
M Adeel, L N Tokarchuk, M A Azam, S K A Khan
AbstractMobile malware has emerged as one of the major threats for modern day mobile networks. Since the first inception a decade ago, hundreds of types of mobile malware and their variants have been discovered. Interactions between mobile using technologies like Bluetooth, MMS, SMS, and mobile and home broadband, leave significant usage footprints on mobile devices. If acquired and processed, these footprints can be utilised for a variety of purposes including the detection of mobile malware. This work is aimed at introducing various behaviour parameters against which the footprints can be recorded, and the processing of these parameters to produce high-order parameters that can prove very effective in different types of devices and network-specific analysis including detection of malware. It is important to state that this work is limited to presenting a comprehensive taxonomy of behaviour parameters only, and a discussion on the mechanism of utilising the behaviour parameters in analysis such as detection of malware is beyond the scope of this work.
Read More on Global Digital Library