communication costs
Recently Published Documents


TOTAL DOCUMENTS

239
(FIVE YEARS 55)

H-INDEX

21
(FIVE YEARS 3)

2021 ◽  
Vol 12 (1) ◽  
pp. 122
Author(s):  
Jongtae Lim ◽  
Byounghoon Kim ◽  
Hyeonbyeong Lee ◽  
Dojin Choi ◽  
Kyoungsoo Bok ◽  
...  

Various distributed processing schemes were studied to efficiently utilize a large scale of RDF graph in semantic web services. This paper proposes a new distributed SPARQL query processing scheme considering communication costs in Spark environments to reduce I/O costs during SPARQL query processing. We divide a SPARQL query into several subqueries using a WHERE clause to process a query of an RDF graph stored in a distributed environment. The proposed scheme reduces data communication costs by grouping the divided subqueries in related nodes through the index and processing them, and the grouped subqueries calculate the cost of all possible query execution paths to select an efficient query execution path. The efficient query execution path is selected through the algorithm considering the data parsing cost of all possible query execution paths, amount of data communication, and queue time per node. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8206
Author(s):  
Mahmood A. Al-Shareeda ◽  
Mohammed Anbar ◽  
Selvakumar Manickam ◽  
Iznan H. Hasbullah

Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system. Therefore, the security and privacy issues in VANETs are entitled to be the most important. To address these issues, the existing Conditional Privacy-Preserving Authentication (CPPA) schemes based on either public key infrastructure, group signature, or identity have been proposed. However, an attacker could impersonate an authenticated node in these schemes for broadcasting fake messages. Besides, none of these schemes have satisfactorily addressed the performance efficiency related to signing and verifying safety traffic-related messages. For resisting impersonation attacks and achieving better performance efficiency, a Secure and Efficient Conditional Privacy-Preserving Authentication (SE-CPPA) scheme is proposed in this paper. The proposed SE-CPPA scheme is based on the cryptographic hash function and bilinear pair cryptography for the signing and verifying of messages. Through security analysis and comparison, the proposed SE-CPPA scheme can accomplish security goals in terms of formal and informal analysis. More precisely, to resist impersonation attacks, the true identity of the vehicle stored in the tamper-proof device (TPD) is frequently updated, having a short period of validity. Since the MapToPoint hash function and a large number of cryptography operations are not employed, simulation results show that the proposed SE-CPPA scheme outperforms the existing schemes in terms of computation and communication costs. Finally, the proposed SE-CPPA scheme reduces the computation costs of signing the message and verifying the message by 99.95% and 35.93%, respectively. Meanwhile, the proposed SE-CPPA scheme reduces the communication costs of the message size by 27.3%.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xiaopeng Yang ◽  
Hui Zhu ◽  
Songnian Zhang ◽  
Rongxing Lu ◽  
Xuesong Gao

Biometric identification services have been applied to almost all aspects of life. However, how to securely and efficiently identify an individual in a huge biometric dataset is still very challenging. For one thing, biometric data is very sensitive and should be kept secure during the process of biometric identification. On the other hand, searching a biometric template in a large dataset can be very time-consuming, especially when some privacy-preserving measures are adopted. To address this problem, we propose an efficient and privacy-preserving biometric identification scheme based on the FITing-tree, iDistance, and a symmetric homomorphic encryption (SHE) scheme with two cloud servers. With our proposed scheme, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational costs of the cloud servers in searching the biometric dataset can be kept at an acceptable level. Detailed security analysis shows that the privacy of both the biometric dataset and biometric identification request is well protected during the identification service. In addition, we implement our proposed scheme and compare it to a previously reported M-Tree based privacy-preserving identification scheme in terms of computational and communication costs. Experimental results demonstrate that our proposed scheme is indeed efficient in terms of computational and communication costs while identifying a biometric template in a large dataset.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Ping Liu ◽  
Syed Hamad Shirazi ◽  
Wei Liu ◽  
Yong Xie

For the simplicity and feasibility, password-based authentication and key agreement scheme has gradually become a popular way to protect network security. In order to achieve mutual authentication between users and edge cloud servers during data collection, password-based key agreement scheme has attracted much attention from researchers and users. However, security and simplicity are a contradiction, which is one of the biggest difficulties in designing a password-based key agreement scheme. Aimed to provide secure and efficient key agreement schemes for data collecting in edge cloud, we propose an efficient and secure key agreement in this paper. Our proposed scheme is proved by rigorous security proof, and the proposed scheme can be protected from various attacks. By comparing with other similar password-based key agreement schemes, our proposed scheme has lower computational and communication costs and has higher security.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Hui Liu ◽  
Shuang Lu ◽  
Ximeng Wang ◽  
Shaobo Long

In the era of the digital economy, social network as an important social capital has an important influence on individual consumption decision-making. This article uses the latest data from the China Household Finance Survey (CHFS) in 2017 to analyze the impact of personal characteristics on cultural consumption behavior under the influence of social networks from a theoretical and empirical perspective. Studies have shown that (1) social networks have a significant impact on cultural consumption; compared to gift money and social interaction, communication costs have a greater impact on cultural consumption; (2) communication costs have a greater impact on education consumption, entertainment consumption, and tourism consumption; (3) under the influence of social networks, individual characteristics have a significant impact on cultural consumption; (4) the higher the level of education, the easier it is for cultural consumption. There are intergenerational differences in cultural consumption expenditures of different age groups. It is easier for people to consume entertainment than the elderly.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6149
Author(s):  
Jelena Stanulovic ◽  
Nathalie Mitton ◽  
Ivan Mezei

Four new algorithms (RFTA1, RFTA2, GFGF2A, and RFTA2GE) handling the event in wireless sensor and robot networks based on the greedy-face-greedy (GFG) routing extended with auctions are proposed in this paper. In this paper, we assume that all robots are mobile, and after the event is found (reported by sensors), the goal is to allocate the task to the most suitable robot to act upon the event, using either distance or the robots' remaining energy as metrics. The proposed algorithms consist of two phases. The first phase of algorithms is based on face routing, and we introduced the parameter called search radius (SR) at the end of this first phase. Routing is considered successful if the found robot is inside SR. After that, the second phase, based on auctions, is initiated by the robot found in SR trying to find a more suitable one. In the simulations, network lifetime and communication costs are measured and used for comparison. We compare our algorithms with similar algorithms from the literature (k-SAAP and BFS) used for the task assignment. RFTA2 and RFTA2GE feature up to a seven-times-longer network lifetime with significant communication overhead reduction compared to k-SAAP and BFS. Among our algorithms, RFTA2GE features the best robot energy utilization.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Hanqing Ding ◽  
Qing Zhang ◽  
Yifeng Yin ◽  
Yong Gan ◽  
Weihua Liu

With the development of the globalization economic integration in Internet of Things (IoT), it is very crucial to protect the wireless two-way authentication between users’ intelligent terminals and servers in the product authorization chain. In order to ensure that legitimate users connect to the wireless network correctly, a lightweight wireless mutual authentication scheme for the product authorization chain was proposed contrapose to the security defect of Kaul and Awasthi’s scheme, which easily suffered from offline password guessing attack. The improved scheme uses lightweight hash function and verifies the freshness of messages by using the send packet sequence number instead of timestamp, which can avoid strict clock synchronization between devices, and user passwords can be updated by themselves. Security analysis and cost and efficiency analysis show that the scheme presented in this paper has higher security, lower storage and communication costs, and lower computational complexity.


Author(s):  
HERI ANDRIANTO ◽  
DANIEL SETIADIKARUNIA ◽  
HENDRY RAHARJO

ABSTRAKGSM VoIP Gateway digunakan untuk menghubungkan jaringan VoIP dengan jaringan GSM sehingga memungkinkan VoIP client melakukan komunikasi dengan VoIP client lain melalui jaringan GSM sehingga biaya komunikasi dapat ditekan. Pada penelitian ini, telah dirancang dan direalisasikan sistem IP PBX yang dihubungkan ke jaringan GSM menggunakan GSM VoIP Gateway. Evaluasi kinerja GSM VoIP Gateway pada sistem IP PBX dilakukan dengan mengamati nilai parameter Quality of Service (QoS). Komunikasi antara VoIP client dengan GSM VoIP Gateway dikategorikan pada kualitas layanan VoIP yang baik karena memiliki nilai rata-rata jitter ≤ 5,7 ms, packet loss ≤ 0,18% dan delay ≤ 9,41 ms. Komunikasi antara softphone SIPdroid dengan GSM VoIP Gateway memiliki nilai rata-rata jitter 22,58 ms, paket loss 48,68%, dan delay 14,54 ms, hal ini disebabkan karena komunikasi VoIP menggunakan koneksi WiFi. Selain itu perbedaan spesifikasi perangkat keras dan perangkat lunak juga turut mempengaruhi nilai parameter QoS.Kata kunci: GSM VoIP Gateway, IP PBX, VoIP ABSTRACTGSM VoIP Gateway is used to connect the VoIP network to the GSM network, allowing VoIP clients to communicate with other VoIP clients via the GSM network therefore the communication costs can be reduced. In this research, an IP PBX system connected to a GSM network using a GSM VoIP Gateway has been designed and realized. Performance evaluation of the GSM VoIP Gateway on the IP PBX system is carried out by observing the value of the Quality of Service (QoS) parameter. Communication between the VoIP client and GSM VoIP Gateway is categorized as a good quality VoIP service because it has an average value of jitter ≤ 5.7 ms, packet loss ≤ 0.18% and delay ≤ 9.41 ms. Communication between the SIPdroid softphone and the GSM VoIP Gateway has an average jitter value of 22.58 ms, a packet loss of 48.68%, and a delay of 14.54 ms, due to VoIP communication uses a WiFi connection. In addition, differences on hardware and software specifications also affect the value of QoS parameters.Keywords: GSM VoIP Gateway, IP PBX, VoIP


Sign in / Sign up

Export Citation Format

Share Document