Top Downloads

Advancements in Communication Technologies: Cellular Networks, Broadband, Cloud Computing, and their Security

Michael James Wood

Abstract

This paper explores modern communication technologies, focusing on the evolution of cellular networks from 1G to 5G, comparing their architectures and advancements. Broadband solutions, including DSL and fiber-optic FTTH, are examined alongside cloud computing models—public, private, hybrid, and community—and service models like SaaS, PaaS, IaaS, and FaaS. Security challenges across these technologies, including cellular, broadband, and cloud systems, are analyzed with proposed countermeasures. The study highlights the importance of innovation and robust security to ensure the reliability of these interconnected systems.

Read More on GDL

A Comprehensive Analysis on the Advancements, Architectures, and Challenges of Wireless Mesh Networks in Enhancing Modern Communication Technologies

Hamza Abid

Abstract

This paper explores the advancements and significance of Wireless Mesh Networks (WMNs) in modern communication technologies, particularly their role in enhancing 4G, 5G, and beyond. It examines the architecture, types of nodes, and various standards of WMNs, highlighting their dynamic, self-organizing nature and cost-effectiveness. The paper also compares WMNs with ad-hoc networks, addressing protocol design and other critical issues. This paper provides a comprehensive analysis of the potential of WMNs to provide flexible, scalable, and reliable network solutions, and can serve as an essential reference for researchers and industry professionals.

Read More on GDL

Bio-Inspired Approaches for Enhancing Scalability, Adaptability, and Resilience in Modern Networking Systems

Khalid Khan

Abstract

In recent years, computer networks have evolved from static, hierarchical structures to highly distributed, autonomous systems. This shift necessitates self-adaptive and self-organizing capabilities in networking nodes. Challenges such as scalability, mobility, resource constraints, and the need for infrastructure-less operation are addressed through biologically inspired approaches. Techniques like Ant Colony Optimization, Artificial Immune Systems, and epidemic spreading offer promising solutions for efficient and robust network control. This paper explores various bio-inspired models and their applications in modern networking paradigms, highlighting their potential to enhance the performance and resilience of large-scale, dynamic, and heterogeneous networks.

Read More on GDL

A Critical Evaluation of the Current Networking Technologies, their Security Vulnerabilities, and Countermeasures

Dan Lee-Jones

Abstract

The rapid evolution of networking technologies has revolutionized data communication, enabling unprecedented levels of connectivity and driving the development of advanced applications. This paper comprehensively reviews current and emerging networking technologies, focusing on their capabilities, vulnerabilities, and implications. It begins with examining the progression of broadband technologies, covering fixed-line options such as DSL, ADSL, fiber optics, powerline communications, and wireless advancements, including WiMAX, 3G, 4G, and 5G. Each technology's strengths, limitations, and specific use cases are analyzed, along with comparative insights into performance, scalability, and accessibility. The paper also explores the transformative role of Software-Defined Networking (SDN) in enabling agile, efficient, and scalable network management, discussing its architecture, operational advantages, and associated security challenges. Short-range communication technologies such as Bluetooth, NFC, infrared, RFID, ANT, and Z-Wave are also examined in detail. Security challenges arising from the widespread adoption of these technologies are critically assessed, and tailored countermeasures are proposed to mitigate associated risks. This holistic analysis offers a valuable framework for understanding the impact of networking advancements on communication infrastructures. It provides actionable insights for researchers, practitioners, and policymakers navigating the complexities of a hyper-connected world.

Read More on GDL

Advancing IoT with Edge Computing: A Comparative Analysis of Cloud, Fog, and Edge Paradigms

Mohammad A Shahzad

Abstract

Recent advancements in Internet technology have significantly transformed the interaction between humans and electronic devices, leading to the rise of the Internet of Things (IoT). This paper explores the evolution and impact of edge computing, a technology that processes data near its source rather than relying solely on cloud computing. By comparing cloud, fog, and edge computing, we highlight the advantages of edge computing in reducing latency, enhancing security, and improving efficiency. The paper also addresses the challenges and opportunities in edge computing, emphasizing its potential applications in smart homes, cities, and collaborative environments. Edge computing represents a pivotal shift towards more responsive and efficient data processing, crucial for the future of IoT.

Read More on GDL

Wireless Body Area Network (WBAN): Security and Authentication Methods

Munir Hussain

Abstract

The demand for WBAN has increased for last few years because it is useful network to monitor and improve various health conditions of human being. Information’s exchanges among different entities are very sensitive, so it is vital to keep this information’s secure from unauthorized access in order to avoid unpleasant incidents. Security and privacy are the most critical issues. Security is the important issue for any network and especially in WBANs its proper management is very crucial otherwise biomedical data collected by sensor nodes should be mixed with other user’s data. Also, patients do not want their personal data to be misused and WBAN should provide the privacy to prevent eavesdropping. Mutual authentication is also a key challenge in WBAN, and patients’ data originality and integrity are important for their treatment diagnosis etc. Development of the new mutual authentication schemes in healthcare applications without considering security makes patient privacy vulnerable. In this paper, we discuss communication technologies, possible attacks and recently most used popular authentication methods in WBANs.

Read More on GDL

Comparative Analysis of the Emerging Wireless Network Technologies

Hamza Abid

Abstract

This paper provides a comprehensive comparative analysis of emerging wireless network technologies, focusing on 5G, Wi-Fi 6, and Wi-Fi 7. The study evaluates these technologies based on key performance metrics such as speed, latency, and capacity, as well as their real-world applications. By examining the technical specifications and practical implementations of each technology, this paper aims to offer insights into their implications for the future of wireless communication. The analysis highlights the advancements brought by each technology, their potential to meet the growing demand for high-speed connectivity, and their suitability for various applications ranging from consumer electronics to industrial automation. The findings of this study are intended to guide stakeholders in making informed decisions about adopting and integrating these technologies into their networks.

Read More on GDL

Evaluation of Energy Efficiency of Popular Mobile Payment Protocols

Munir Hussain, Syed Usman Jamil

Abstract

Over the last few years, the popularity of both electronic and mobile commerce (M-Commerce) has increased due to advancement in the Information Technology (IT). Evaluation of E-commerce and M-commerce protocols has always remained a subject of sustained effort to find an optimal solution. Mobile devices are resource constrained in terms of memory, processing and battery power. There have been efforts in the past for evaluation of such protocols based on the issues like privacy, security and efficiency. In this paper special consideration however is given to the battery power and thus evaluates few well-known M-commerce payment protocols for their battery requirements in terms of energy cost and compares energy cost of these protocols to find the most optimal solution for mobile payment.  Initial objective of this paper finds out energy consumption for every individual entity involved in the most popular mobile payments protocols. After the earlier has been achieved, the second and the most fundamental objective of this work is to calculate the overall energy consumption and to analyze these selected protocols to find out the most energy efficient protocol.

Read More on GDL

Efficient Data Aggregation Scheme in Secure Tree based Wireless Sensor Networks (EDAS)

Khalid Khan

Abstract

Wireless sensor networks (WSNs) have emerged as an important area of research from the last two decades. In WSNs, sensors have limited memory, computational capability and battery power. One of the solutions to these issues is to reduce the data transmission and today, various data aggregation protocols have been proposed to reduce network traffic. But they created security issues like authentication, data integrity and freshness. Hop-by-hop secure data aggregation protocols were proposed to provide security along with data aggregation function. But, data on the aggregators still need to be secured because aggregators are exposed to node compromises. End-to-end secure data aggregation protocols are proposed. They provide end-to-end security and privacy of data. One of these protocols is Secure End-to-End Data Aggregation (SEEDA), which ensured end-to-end privacy of data. However, the protocol has higher communication cost and computational overheads because it sends extra bits/data regarding non-responding nodes and performs unnecessary computations for non-responding nodes. I proposed new protocol, EDAS which reduces 12% to 25% communication and computational overheads as compared to SEEDA and it is also efficient in energy consumption.

Read More on GDL

Cyber-Edge Computing Applications and Challenges: A Review

Muhammad Ali Paracha, Syed Noman Jamil, Abdul Rasheed, Nadia Jamil

Abstract

This research paper investigates the realm of Cyber-Edge computing, further reviewing its fundamental concepts, challenges, and applications. In a rapidly evolving landscape of interconnected devices and data-driven paradigms, the convergence of edge computing and cybersecurity takes centre stage. The paper commences by explaining the core components of Cyber-Edge architecture, encompassing policies, management, and protocols. Furthermore, it explores the Cyber-Edge applications, showcasing its transfor- mative potential in domains such as smart agriculture, smart homes, and enhanced healthcare systems. In navigating the landscape of Cyber-Edge, inherent challenges surface, ranging from cyber threats to privacy concerns, thereby prompting an analysis of future directions. Additionally, the paper formulates pivotal research questions that pave the way for further exploration in this dynamic field. The manuscript is structured on Cyber-Edge fundamentals, examines challenges, highlights practical IoT applications within the Edge paradigm and finally, presents research questions, followed by comprehensive conclusions. As the digital landscape continues to evolve, the interdependent relationship between Cyber-Edge computing and security emerges as a cornerstone in shaping the landscape of the Internet of Things (IoT) and edge networking.

Read More on GDL

SKEP & SEEKDP: Towards Secure and Energy-Efficient Key Exchange and Distribution in Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Security and Energy are important issues when wireless sensor network (WSN) is deployed in harsh environments. WSN security becomes real challenge for the researchers because these networks are vulnerable to security attacks due to the broadcast nature of transmission. Due to the limited memory, CPU, and battery power of sensor nodes, traditional asymmetric-key distribution protocols are expensive and rather infeasible. Thus, only a very few conventional protocols can readily be used in sensor networks and key management schemes should be designed carefully to reduce computations power over the sensor node as well. In this paper we analyse existing Key Management Protocols like SPINS, SEKEN, SNAKE, Security Architecture for Mobile WSNs and BROSK for their vulnerabilities against Denial-of-Service attacks. In WSNs, where the most protocols working on point-to-point handshaking procedures to negotiate link dependent keys, this influences the scalability of the network, we present a novel protocol SKEP to construct link dependent keys by unicasting. We also propose SEEKDP a security protocol that prevents certain attacks, distribute keys, exchange information in an efficient manner and provide security by consuming less energy of regular sensor node.

Read More on GDL

Study of Network Design Considerations for Small Businesses

Michael James Wood

Abstract

This paper investigates the logical and physical network design considerations for a small business.  Moreover, the paper investigates how a business facing data consistency issues may address the issue by implementing a network design solution and how networks can be monitored and protected from security threats. 
Part one of this paper investigates the networking solution and networking topologies. Part two discusses networking infrastructure such as the purchasing of necessary networking devices to centralize the businesses data communications and background and foreground services. Part three of this paper discusses various aspects of network and data communication monitoring using a networking tool provided by SolarWinds. The last section, part four investigates a security proposal for the businesses network and discusses data recovery, malware and authentication.  

Read More on GDL

Analysis of the Critical Aspects of M-commerce and Mobile Payment Systems 

Munir Hussain

Abstract

The fast spreading of wireless technology services are more focusing on businesses area rather than targeting customers. Even now, this advancement in the mobile technology continues to bang the international business market intensely, modern mobile technologies and their applications are more focusing the mobile business area. Today, the world of electronic transactions is switching from E-commerce to M-commerce. In order to solve critical issues in M-commerce it becomes vital to understand different concepts and technologies associated with M-commerce. The first part of this paper gives overview of M-commerce in terms of their characteristics, applications, and issues pertaining to it, including many critical issues such battery power consumption in M-commerce transactions. Battery is one of the most important and scarce resources in mobile devices thus to extend the mobile devices battery lifetime, it becomes important to save the battery resource as much as possible. The second part of this paper focuses on exploring various aspects of enabling mobile payment systems, mobile payment modes and characteristics and the payments system requirements. 

Read More on GDL

Evaluation of Design and Security of the Network Infrastructure of a UK-Based SME

Daniel Jones

Abstract

This paper evaluates various aspects of design and security of the network infrastructure of an SME in the UK. It signifies how the best practices in network deployment from the literature can be used to acquire an efficient and secure communication network. The paper includes comparative analyses of a wide range of components of the network infrastructure, and different types of network diagrams. The paper also discusses various aspects of monitoring of the network infrastructure, highlights the critical parameters to gauge network performance, and demonstrates the use of different monitoring tools. The last section of this paper discusses security in the context of network infrastructure of the SME. It discusses various theoretical aspects of security, identifies various threats that could be posed to the SMEs, and a range of logical and physical countermeasures to protect against security threats and attacks. This paper can be helpful for the researchers and practitioners interested in the design and security of the network infrastructure of the SMEs. This paper can also act as a guideline for the users to apply the best practices from the literature to their own network deployment and management.

Read More on GDL

Lightweight Secure and Scalable Key Sharing Protocol for Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Wireless Sensor Networks (WSN) technology is still immature and thus faces a variety of problems due to limited memory, CPU and battery power resources. WSNs are prone to active and passive attacks. While the former is capable of affecting minimal resources, the latter type of attack is difficult to launch but very powerful in terms of affecting critical resources. Most shared key security protocols used in WSNs are not scalable as they depend upon third party or KDC. Although in some situations this concept works well, besides reducing scalability, finding a trustworthy third party is also very difficult in KDC concept of key sharing. This paper gives a brief overview of WSNs, posed security threats to these networks and relevant security issues. This paper also brings in a novel key sharing model for traversing secret key in WSNs that does not depend on third party concept and hence it is a more scalable and secure.

Read More on GDL

On the Collection of Statistical Parameters on Mobile Phones for Detection of Security Attacks and Mobile Malware

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

Communication between mobiles using technologies like Bluetooth, MMS, SMS, Mobile and Home Broadband can increase their susceptibility to mobile security threats. In the past few years, mobile malware has emerged as one of the major threats for modern-day mobile devices. Since the first malware outbreak in 2004, hundreds of mobile viruses, worms, Trojans and spyware and over thousands of their variants have been discovered. With such a large number of ever-evolving malware, it is challenging to develop an electronic system capable of detecting such malware. In this work, the statistical data generated as a consequence of interactions on mobile devices and the mechanism of recording this data against statistical parameters on mobile devices is discussed. We also provide a detailed taxonomy of the low and high-order statistical parameters and discuss how these parameters (besides utilisation in other scenarios) can be affectively utilised in the detection of a variety of security attacks and malware types. 

Read More on GDL

Technical Evaluation of the Functionality of Popular Mobile Payment Protocols

Munir Hussain, Syed Usman Jamil

Abstract

Today, mobile commerce flexibility has totally changed businesses in the world due to easy mobile-based online bookings and payments. Its implementation is not limited to any single area but it can be utilized in all sorts of situations and organizations in various ways. It can be utilized in banking, electronic publication distribution, online sales, online payments for different utility bills and online booking of airlines etc. These kinds of online booking, buying and selling, and their payment services are available to anyone 24/7 in the world. When using these types of facilities, one needs to understand and study different types of characteristics of this new technology i.e., it is important to understand different modes of payments, various technologies using mobile payment system, and different M-commerce payment protocols. As we know, energy consumption is a critical issue in M-commerce, so it is important to reduce battery power consumption as much as possible. In this paper, we will explore some of the most popular mobile payment protocols step-by-step to fully understand their working environment.

Read More on GDL

Evaluation of the MPeersim – A Simulation Environment for Mobile Networks

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

MPeersim is a simulation environment for mobile and mobile P2P networks. It simulates different types of mobile nodes and communication technologies such as Bluetooth, MMS, and SMS. With a primary emphasis of evaluation of MPeersim in terms of simulation statistics, this paper will elaborate on various MPeersim functionalities in context of availability of generic, node, and network-specific simulation parameters, node and network-specific statistics available for various types of analyses, and on the capabilities of MPeersim in terms of presenting empirical data in different formats including graphs and visualisations for monitoring purposes. Providing a comprehensive understanding of the relationship between parameters and statistics will assist researchers in planning for developing simulation environments.

Read More on GDL

A Hybrid Model for Usability of Mobile Applications

Rabia Afzal Minhas, Khola Rafique, Ali Javed, Muhammad Awais Azam

Abstract

The success of mobile applications depends upon its usability. Of all the non-functional requirements, usability dimension is the foremost requirement for mobile applications. The usability of mobile applications should be high so that users can interact with them easily. There have been many models proposed that help developers make mobile applications more usable. But they did not address all the issues. In our paper, we propose a framework which is hybrid of multiple models including ISO, Moe, Voelle, Nielsen Zhang, and PACMAD models. In this paper, we also introduce a novel feature “Waste-app” for efficient utilization of memory. It automatically cleans up cache and the apps that have been in use for a long time. The proposed methodology shows that inclusion of this new feature and the new hybrid model gives better results in usability aspects.

Read More on GDL

The Taxonomy of Behavioural Parameters on Mobile Devices

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

Mobile malware has emerged as one of the major threats for modern day mobile networks. Since the first inception a decade ago, hundreds of types of mobile malware and their variants have been discovered. Interactions between mobile using technologies like Bluetooth, MMS, SMS, and mobile and home broadband, leave significant usage footprints on mobile devices. If acquired and processed, these footprints can be utilised for a variety of purposes including the detection of mobile malware. This work is aimed at introducing various behaviour parameters against which the footprints can be recorded, and the processing of these parameters to produce high-order parameters that can prove very effective in different types of devices and network-specific analysis including detection of malware. It is important to state that this work is limited to presenting a comprehensive taxonomy of behaviour parameters only, and a discussion on the mechanism of utilising the behaviour parameters in analysis such as detection of malware is beyond the scope of this work.

Read More on GDL

ICN Framework and Its Challenges for IOT Applications

Syed Usman Jamil, Khalid Khan

Abstract

The early internet user needs were coped by current internet architecture that was based on host-centric communication model. Now a day, usage as well as requirements of internet is changed however mostly internet users are interested to access large amount of data/information regardless of physical location.  This paradigm changes in the internet usage model along with mobility support, better security and pressing needs of users has invited researchers to consider radical changes in the internet architecture. By following this direction, we have reviewed many on-going efforts of researchers in which the future internet can be developed on the foundation of Information- Centric Networking. 
To sync billions of objects over the internet is promised by the internet of things (IOT). To deploy numerous individual IOT architectures, in domains of diverse nature, the ongoing trend is to deploy a common IOT platform, so that objects may be accessible and synchronized with applications across domains and organizations. To achieve this goal, limited proposals are developed to model unified host centric IOT infrastructure operate at upper layer of current host centric internet. Therefore, fundamental mismatch is evident in between the today’s host centric nature of internet and IOT system having information centric nature. We propose to develop common set of services and protocols to resolve this mismatch, which form a platform for IOT, on the basis of ICN paradigm, which may be named as ICN-IOT platform.  ICN-IOT merger is the ICN salient feature and therefore enables seamless scalability, mobility support and efficient service and content delivery. 
The main aim of these investigations is to find out the core functionalities of ICN architectures, overview of IOT functionalities and architectural requirements, and the review of ICN over IOT implementations and their advantages and challenges to sketch out the key unresolved challenges in this field of networking research.  

Read More on GDL

Ad-hoc and Opportunistic Routing in Dynamic Scatternet Environment

S K A Khan, M Adeel, M A Azam

Abstract

In reality, mobile ad-hoc networks are highly unpredictable because any node can join or leave the network at any time, thus making reliable and effective communication a problem. This issue is addressed by introducing new breed of ad-hoc networking, known as opportunistic networks. Opportunistic networking is a concept that has evolved from mobile ad-hoc networking. In opportunistic networks nodes have no prior knowledge of routes to intended destinations. Any node in the network can be used as potential forwarder with the exception of taking information one step closer to intended destination. The forwarding decision is based on the information gathered from the source node or encountering node. The opportunistic forwarding can only be achieved if message forwarding is carried out in store and forward fashion. Although, opportunistic networks are more flexible than traditional MANETs, however, due to little insight of network, it poses distinct challenges such as intermittent connectivity, variable delays, short connection duration and dynamic topology. Addressing these challenges in opportunistic network is the basis for developing new and efficient protocols for information sharing. This paper presents a conceptual study for opportunistic networks to improve the overall message delivery at destinations while keeping the communication cost very low. Some assumptions are considered to improved directivity of message flow towards intended destinations. These assumptions exploit human social relationships analogies such as popularity and use of hybrid communication by applying opportunistic concepts on top of traditional ad-hoc routing such as AODV to gain maximum message directivity. The experiment results have shown that by combining traditional ad-hoc routing with opportunistic forwarding has not only improved directivity but as a result have achieved a great improvement in message delivery to intended destinations.

Read More on GDL

IOARP EDITORIAL SYSTEM

IES is a comprehensive web-based software designed exclusively to manage the review process for conferences, journals, and books.

Visit Website >

GLOBAL DIGITAL LIBRARY

Global Digital Library provides an opportunity to the researchers to access high-quality content published in our conferences, journals, and books. 

Visit Website >

LATEST RESEARCH NEWS

Our dedicated team researches through thousands of scholarly articles, blogs, and technology magazines to publish cutting-edge research in your field of interest. 

Read Research News >

IOARP NEWSLETTER

We publish a monthly newsletter to keep our readers posted about IOARP activities, information on products and services, and benefits of publishing with us.

Read Newsletter >

IOARP RESEARCH BLOG

Renowned researchers in academia and industry publish their blogs with IOARP on cutting-edge research, recent innovations, and novel research directions in different domains.

Read Research Blog >

IOARP Shop

Use our e-shop to purchase a wide range of products, pay for our services, or to access offers and discounts available across multiple IOARP websites.

Visit IOARP Shop >