Search Results/Filters    

Filters

Year

Banks


Expert Group



Full-Text


Issue Info: 
  • Year: 

    2020
  • Volume: 

    12
  • Issue: 

    2
  • Pages: 

    101-111
Measures: 
  • Citations: 

    0
  • Views: 

    156
  • Downloads: 

    76
Abstract: 

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, various protocols and schemes were proposed to achieve security requirements in M2M communication and reduce computational and communication costs. In this paper, we propose the group-based secure, lightweight handover authentication (GSLHA) protocol for M2M communication in LTE and future 5G networks. The proposed protocol mutually authenticates a group of MTC devices (MTCDs) and a new eNodeB (eNB) when these simultaneously enter the coverage of the eNB with considering all the cellular network requirements. The security analysis and formal verification by using the AVISPA tool show that the proposed protocol has been able to achieve all the security goals and overcome various attacks. In addition, the comparative performance analysis of the handover authentication protocols shows that the proposed GSLHA protocol has the best computational and communication overheads.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 156

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 76 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

DEYPIR MAHMOOD | Gouya Farzad

Issue Info: 
  • Year: 

    2021
  • Volume: 

    50
  • Issue: 

    4 (94)
  • Pages: 

    1581-1591
Measures: 
  • Citations: 

    0
  • Views: 

    187
  • Downloads: 

    0
Abstract: 

The video is a popular service among users which plays an important role in the networks traffic and has hugest volume of data compared to other types of communications. In recent years, the great willingness of users to watch live videos has attracted the researchers to the networks equipped with content saving devices in which the video content is saved in advance within the edge devices (small stations and smart devices) for fast delivery. In this paper, we have proposed a new method to send the video content based on the D2D connection and providing a multi-connection and multi-user opportunities. According to the random nature of the popularity of video content and the random demands of users in the network, the authors of the article use the random distribution of popularity among users to investigate the probability of sending the same content to some users simultaneously. In this method, the requests of some users are answered by one response. Extensive simulations results of the proposed method reveals the important effect of the random distribution of video content popularity and show that using multi-link D2D connections can cause significant improvements in the efficiency of the network in term of the network throughput.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 187

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

SCIENTIA IRANICA

Issue Info: 
  • Year: 

    2022
  • Volume: 

    29
  • Issue: 

    6 (Transactions D: Computer Science and Engineering and Electrical Engineering)
  • Pages: 

    3273-3287
Measures: 
  • Citations: 

    0
  • Views: 

    5
  • Downloads: 

    0
Abstract: 

Nowadays, one of the most important criterions in designing different generations of cellular technology is to handle a large number of heterogeneous devices with high security guarantees. The first significant security issue considered in this field is mutual authentication of the devices and the network and authenticated key agreement between them. Hence, various authentication and key agreement (AKA) protocols were proposed for Long Term Evolution (LTE) and 5G networks. However, each of the protocols suffer from various security and performance problems. This paper proposes a group-based secure lightweight authentication and key agreement (GSL-AKA) protocol for machine-to-machine (M2M) communication. Security analysis and formal verification using the AVISPA tool prove that the proposed protocol overcomes various known security attacks and provides all the considered security requirements. Moreover, performance analysis shows that the communication and computation overheads of the proposed protocol are the lowest in comparison with the other existing group-based AKA protocols.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 5

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

SCIENTIA IRANICA

Issue Info: 
  • Year: 

    2024
  • Volume: 

    31
  • Issue: 

    Transactions on Computer Science & Engineering and Electrical Engineering (D)10
  • Pages: 

    750-763
Measures: 
  • Citations: 

    0
  • Views: 

    13
  • Downloads: 

    0
Abstract: 

The lack of qualified developers is the main reason for the shortage of software. One solution to overcome this problem is to leverage the end user for software development. Model-based approaches attempt to facilitate the involvement of the end user in the software development process. Various approaches have been explored to automatically transform the user interface model into the source code. However, the research community has focused less on describing the user interface with natural language. We used the MDA approach and the CAMELEON reference framework to develop a natural controlled modeling language (CNUIML) for modeling the user interface of web applications. The meta-model of the designed language is represented by the meta-meta-model and the grammar of the language is developed using EBNF. The usability of CNUIML has been evaluated through two case studies. The models described with this language are AUI-level models based on CRF and a PIM, based on the MDA approach. In this study, we have shown that the model designed with this language can be transformed into similar models such as task models or class diagrams using M2M. We have also discussed how the source code is obtained from the transformation of this model using M2T.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 13

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    8
  • Issue: 

    4 (32)
  • Pages: 

    33-40
Measures: 
  • Citations: 

    0
  • Views: 

    131
  • Downloads: 

    0
Abstract: 

In this study, the evaluation quality of metal samples internal defects in conventional ultrasonic methods, fuzzy array and full focus method were compared. The UT method met the basic needs in the evaluation of defects, but due to the variety of defects, PAUT and TFM methods were successfully introduced. TFM evaluation has significantly improved the performance of ultrasonic defects. Gekko M2M device was used to compare the quality of the mentioned methods. This device has the ability to compare and evaluate defects with ultrasonic methods, fuzzy arrays, diffraction flight time and full focus method separately. According to ASTM E2491 standard, samples with specific defects and different sizes and distances from each other were prepared and the evaluation of these defects was performed separately by the mentioned methods in order to identify, measure and compares them. The results show that the ultrasonic method represents the defects with smaller size that are placed next to each other as a single defect. The fuzzy array method has the ability to distinguish these defects from each other, but the flight time diffraction method measures, examines and detects the type of defects with high accuracy. We will also cover industrial cases to demonstrate the benefits of the full focus method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 131

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2018
  • Volume: 

    4
  • Issue: 

    2 (serial 14)
  • Pages: 

    101-134
Measures: 
  • Citations: 

    0
  • Views: 

    247
  • Downloads: 

    111
Abstract: 

Internet of Things (IoT) is a novel and emerging paradigm to connect real/physical and virtual/logical world together. So, it will be necessary to apply other related scientific concepts in order to achieve this goal. The main focus of this paper is to identify the research topics in IoT. For this purpose, a comprehensive study has been conducted on the vast range of research articles. IoT concepts and issues are classified into some research domains and sub-domains based on the analysis of reviewed papers that have been published in 2015 & 2016. Then, these domains and subdomains have been discussed as well as it is reported their statistical results. The obtained results of analysis show the most of the IoT research works are concentrated on technology and software services domains similarly at first rank, communication at second rank and trust management at third rank with 19%, 14% and 13% respectively. Also, a more accurate analysis indicates the most important and challenging sub-domains of mentioned domains which are: WSN, cloud computing, smart applications, M2M communication and security. Accordingly, this study will offer a useful and applicable broad viewpoint for researchers. In fact, our study indicates the current trends of IoT area.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 247

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 111 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

ROSHD-E-FANAVARI

Issue Info: 
  • Year: 

    2023
  • Volume: 

    19
  • Issue: 

    supp
  • Pages: 

    10-18
Measures: 
  • Citations: 

    0
  • Views: 

    262
  • Downloads: 

    71
Abstract: 

The fourth industrial revolution, with the convergence of new technologies, has led to the emergence of smart cities. While the smartening of cities by governments has been happening at a high speed, the concept and implementation of the smart city are still being updated and changed. In this regard, the current research aims to analyze the thematic trends of publications on smart city in the Web of Science (WoS) database from the emergence of the fourth industrial revolution to 2021, and track the thematic trends of these studies. This scientometric research was carried out descriptively with the content analysis method, using the techniques of co-occurrence analysis and social network analysis. The trends of publications and citation influence of studies in the field of smart cities in the last decade has had an upward growth of 38. 78% and 69. 49%, respectively. In the three time periods, "IoT, City, Internet, and Wireless Sensor Network" have the most frequency, "IOT, City, Internet, and Wireless Sensor Network" have the most connections, and "ipv6, Sustainable City, and Urban Development" in 2012–2015, "Taxonomy, cloud objects and distributed computing" in 2016–2018 and "Literature review, urban informatics, and sustainable urban development" in 2019-2021 have received the most citations. In 2012–2015, clusters of sensor networks, smartphones, genetic algorithms, advanced sensors, ubiquitous city, and m2m, in 2016-2018 clusters of deep learning, participation, evolutionary algorithms, ubiquitous computing, and smart cities, and in 2019-2021 blockchain clusters, participation citizenship, IoT, topics, technologies, and tools. multi-agent systems, and Brazil were identified.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 262

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 71 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
email sharing button
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
sharethis sharing button