Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Darif, Anouar | Aboutajdine, Driss | Saadane, Rachid
Article Type: Research Article
Abstract: Impulse Radio Ultra Wideband is a new efficient short range wireless communication technology for wireless sensor network applications. Its impulsional nature makes it robust to multipath fading, as the short duration of the pulses leads most multipath components to arrive isolated with short energy pulses instead of a carrier signal. For a good exploitation of this new technology, we need a suitable Medium Access Control protocol in the MAC layer. WideMac was the first MAC protocol trying to implement adaptive low power consumption to IR-UWB technology. The Backoff algorithm used by this protocol is Modified Binary Exponent Backoff (MBEB). The …unfair access to the transmission channel represents the major problem of this algorithm. In this paper, we introduce a new Backoff algorithm based on Fuzzy Logic called FLB (Fuzzy Logic Backoff) to improve the Packet Delivery Ratio (PDR) and decrease the number of dropped packets from the nodes’ buffer. To analyze and evaluate the performance of the proposed backoff algorithm, a simulation of a sink based architecture network with various nodes’ number has been performed. Show more
Keywords: WSN, IR-UWB, WideMac, fuzzy logic, packets delivery, packets dropped, power consumption
DOI: 10.3233/JHS-180589
Citation: Journal of High Speed Networks, vol. 24, no. 3, pp. 175-185, 2018
Authors: Elmazi, Donald | Cuka, Miralda | Bylykbashi, Kevin | Spaho, Evjola | Ikeda, Makoto | Barolli, Leonard
Article Type: Research Article
Abstract: Wireless Sensor and Actor Network (WSAN) is formed by the collaboration of micro-sensor and actor nodes. Whenever there is any special event i.e., fire, earthquake, flood or enemy attack in the network, sensor nodes have responsibility to sense it and send information towards an actor node. The actor node is responsible to take prompt decision and react accordingly. In this work, we consider the actor node selection problem and implement two intelligent fuzzy-based systems (IFBSs). We call these systems IFBS1 and IFBS2. For IFBS1, we consider three input parameters: Job Type (JT), Distance to Event (DE) and Remaining Energy (RE). …In IFBS2, we add CS parameter, so IFBS2 has four input parameters. The IFBS2 is more complex than IFBS1, but can make a better selection of actor nodes than IFBS1 by considering also the actor congestion situation. Show more
Keywords: Wireless networks, WSAN, fuzzy logic, intelligent systems, congestion situation
DOI: 10.3233/JHS-180590
Citation: Journal of High Speed Networks, vol. 24, no. 3, pp. 187-199, 2018
Authors: Guan, Wenhao | Wang, Yunling | Wang, Jianfeng | Fu, Xiaotong
Article Type: Research Article
Abstract: Searchable symmetric encryption (SSE) allows a data owner to outsource his encrypted data to a cloud server while retaining the ability to perform keyword search over encrypted data. The security guarantees of existing SSE schemes require that the adversary has no access to the data owner’s secret keys. Unfortunately, adversaries may get some or all of the secret keys through memory attacks. Facing such memory attacks, most existing SSE schemes are no longer secure. Recently, a memory leakage-resilient dynamic SSE (MLR-DSSE) scheme has been proposed to resist memory attacks from physically unclonable functions (PUFs). However, this scheme does not consider …the possibility of dishonest behaviors on the part of cloud servers. In this paper, we first propose a verifiable MLR-DSSE scheme based on PUFs and a verifiable hash table. The construction not only resists memory attacks but also supports verifiable search and dynamic updates. Besides, due to the combination of the secret sharing technique with PUFs, our proposed scheme can recover secret keys even if some PUFs are broken. Furthermore, the security analysis demonstrates that our proposed scheme is non-adaptively secure against memory attacks. The evaluation experiment results show that our scheme is efficient. Show more
Keywords: Searchable symmetric encryption, verifiability, memory leakage-resilient, physically unclonable functions, cloud computing
DOI: 10.3233/JHS-180591
Citation: Journal of High Speed Networks, vol. 24, no. 3, pp. 201-217, 2018
Authors: Abdulhassan, Aladdin | Ahmadi, Mahmood
Article Type: Research Article
Abstract: In recent years, a modern networking paradigm called Software-Defined Networking (SDN) has been introduced to manage the large networks and datacenters. This paradigm was introduced to keep pace with the rapid growth rates on the Internet and to support advanced network applications. SDN uses an open standard protocol called OpenFlow to manage the network traffic. In OpenFlow switches, the software control plane has been decoupled from the hardware data plane and placed in a controller which has a network-wide view. OpenFlow process all incoming packets that have the same characteristics (lie in the same class) in the same manner. In …this paper, we propose and use a generalized extension of BR-tree data structure called AMQ-R tree to organize the rule-sets in a multi-dimensional tree integrated with approximate membership query data structures including Bloom, Quotient and Cuckoo filters in order to get higher quality packet classification performance. Three types of approximate membership query filters integrated with the R-tree have been designed and implemented. Also, a multi-threading technique has been used to accelerate the packet classification by querying the tree in a parallel manner. The experimental results using simulated rule-sets show that this technique can classify incoming packets in up to 1.4 MPPS (Mega Packet per Second) with very small memory requirements. Show more
Keywords: Software defined networking, OpenFlow, many-field packet classification, R-tree, approximate membership query, Cuckoo filter
DOI: 10.3233/JHS-180592
Citation: Journal of High Speed Networks, vol. 24, no. 3, pp. 219-241, 2018
Authors: Nakamura, Shigenari | Ogiela, Lidia | Enokido, Tomoya | Takizawa, Makoto
Article Type: Research Article
Abstract: A publish/subscribe (PS) model is an event-driven model of a distributed system. In traditional PS systems, each peer (process) can either publish or subscribe events. In this paper, we consider a peer-to-peer (P2P) type of topic-based PS model where each peer can both publish and subscribe events. In this paper, we newly propose a topic-based access control (TBAC) model for topic-based PS systems. Here, an access right is a pair ⟨ t , op ⟩ of a topic t and a publish or subscribe operation op . A peer is allowed to publish an …event message with publication topics and subscribe interesting topics only if the publication and subscription access rights are granted to the peer, respectively. An event message e is delivered to a peer p i if the publication of e and subscription of p i include some common topic. If a peer p i publishes an event message e 2 after receiving an event message e 1 , the event message e 2 may bring some information of the event message e 1 . If a target peer p j is not allowed to subscribe at least one topic which is related with the event message e 1 , information in the peer p i illegally flows to the target peer p j . We newly propose a subscription-based synchronization (SBS) protocol to prevent illegal information flow. Here, an event message is banned by a target peer if the event message implies illegal information flow. However, event messages may be unnecessarily banned by a peer even if no illegal information flow to the peer occurs. In the evaluation, we show the number of event messages unnecessarily banned in the SBS protocol. Show more
Keywords: Information flow control, peer-to-peer (P2P) model, topic-based publish/subscribe (PS) systems, subscription-based synchronization (SBS) protocol, topic-based access control (TBAC) model, unnecessarily banned message
DOI: 10.3233/JHS-180593
Citation: Journal of High Speed Networks, vol. 24, no. 3, pp. 243-257, 2018
Authors: Wang, Jingjing | Zhang, Xiaoyu | Tao, Xiaoling | Wang, Jianfeng
Article Type: Research Article
Abstract: With the synchronous development of both cloud computing and machine learning techniques, the resource constrained clients are preferring to outsource the tasks of data storage and computation to the cloud server. However, in this outsourcing paradigm, since the data owners lose the control of their data, it is of vital significance to address the privacy concern of data stored on the cloud server. Hence, many researchers have been focusing on preserving the privacy of training data in learning model. Recently, Wang et al. presented a privacy protection single-layer perceptron learning for e-healthcare (PSLP) by using Paillier cryptosystem. In this paper, …we present that the cloud server can obtain the sensitive training data and weight vector in the PSLP scheme. Besides, based on a symmetric homomorphic encryption algorithm, we propose an efficient and privacy-preserving single-layer perceptron learning scheme in cloud computing, named EPSLP. Security analysis shows that the proposed EPSLP can protect the privacy of training data, intermediate results and the optimal single-layer perceptron predictive models. Finally, we implement the EPSLP scheme and PSLP scheme, and extensive experiments indicate that the EPSLP is efficient in data encryption phase and the training phase of predictive model. Show more
Keywords: Cloud computing, single-layer perceptron model, symmetric homomorphic encryption, privacy preservation, neural network
DOI: 10.3233/JHS-180594
Citation: Journal of High Speed Networks, vol. 24, no. 3, pp. 259-279, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]