Empowering Human Decision-Making in AI Models: The Path to Trust and Transparency
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 39-56, 2023, DOI:10.32604/iasc.2023.031522
Abstract Network analysis is a promising field in the area of network applications as different types of traffic grow enormously and exponentially. Reliable route prediction is a challenging task in the Large Scale Networks (LSN). Various non-self-learning and self-learning approaches have been adopted to predict reliable routing. Routing protocols decide how to send all the packets from source to the destination addresses across the network through their IP. In the current era, dynamic protocols are preferred as they network self-learning internally using an algorithm and may not entail being updated physically more than the static protocols. A novel method named Reliable… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.45, No.1, pp. 785-801, 2023, DOI:10.32604/csse.2023.030393
Abstract Internet of Things (IoT) empowers imaginative applications and permits new services when mobile nodes are included. For IoT-enabled low-power and lossy networks (LLN), the Routing Protocol for Low-power and Lossy Networks (RPL) has become an established standard routing protocol. Mobility under standard RPL remains a difficult issue as it causes continuous path disturbance, energy loss, and increases the end-to-end delay in the network. In this unique circumstance, a Balanced-load and Energy-efficient RPL (BE-RPL) is proposed. It is a routing technique that is both energy-efficient and mobility-aware. It responds quicker to link breakage through received signal strength-based mobility monitoring and selecting… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4087-4106, 2022, DOI:10.32604/cmc.2022.026141
Abstract Packet dropping in a mobile ad hoc network can manifest itself as the data plane attacks as well as control plane attacks. The former deal with malicious nodes performing packet drop on the data packets following the route formation and the latter deal with those malicious nodes which either drop or manipulate the control packets to degrade the network performance. The idea of the proposed approach is that during the route establishment, each of the on-path nodes is provided with pre-computed hash values which have to be used to provide a unique acknowledgement value to the upstream neighbor which acts… More >
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 809-824, 2022, DOI:10.32604/iasc.2022.021128
Abstract Cognitive Radio Network (CRN) has turn up to solve the issue of spectrum congestion occurred due to the wide spread usage of wireless applications for 6G based Internet of Things (IoT) network. The Secondary Users (SUs) are allowed to access dynamically the frequency channels owned by the Primary Users (PUs). In this paper, we focus the matter of contention of routing in multi hops setup by the SUs for a known destination in the presence of PUs. The traffic model for routing is generated on the basis of Poison Process of Markov Model. Every SU requires to reduce the end-to-end… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4147-4167, 2022, DOI:10.32604/cmc.2022.020659
Abstract Recently, Opportunistic Networks (OppNets) are considered to be one of the most attractive developments of Mobile Ad Hoc Networks that have arisen thanks to the development of intelligent devices. OppNets are characterized by a rough and dynamic topology as well as unpredictable contacts and contact times. Data is forwarded and stored in intermediate nodes until the next opportunity occurs. Therefore, achieving a high delivery ratio in OppNets is a challenging issue. It is imperative that any routing protocol use network resources, as far as they are available, in order to achieve higher network performance. In this article, we introduce the… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.40, No.2, pp. 703-717, 2022, DOI:10.32604/csse.2022.019557
Abstract Opportunistic Networks (OppNets) is gaining popularity day-by-day due to their various applications in the real-life world. The two major reasons for its popularity are its suitability to be established without any requirement of additional infrastructure and the ability to tolerate long delays during data communication. Opportunistic Network is also considered as a descendant of Mobile Ad hoc Networks (Manets) and Wireless Sensor Networks (WSNs), therefore, it inherits most of the traits from both mentioned networking techniques. Apart from its popularity, Opportunistic Networks are also starting to face challenges nowadays to comply with the emerging issues of the large size of… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 505-519, 2021, DOI:10.32604/cmc.2021.016123
Abstract Many routing protocols, such as distance vector and link-state protocols are used for finding the best paths in a network. To find the path between the source and destination nodes where every node is visited once with no repeats, Hamiltonian and Hypercube routing protocols are often used. Nonetheless, these algorithms are not designed to solve the problem of a node failure, where one or more nodes become faulty. This paper proposes an efficient modified Fault-free Hamiltonian Cycle based on the Hypercube Topology (FHCHT) to perform a connection between nodes when one or more nodes become faulty. FHCHT can be applied… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 447-470, 2021, DOI:10.32604/cmc.2021.014967
Abstract Internet of Things (IoT) network used for industrial management is vulnerable to different security threats due to its unstructured deployment, and dynamic communication behavior. In literature various mechanisms addressed the security issue of Industrial IoT networks, but proper maintenance of the performance reliability is among the common challenges. In this paper, we proposed an intelligent mutual authentication scheme leveraging authentication aware node (AAN) and base station (BS) to identify routing attacks in Industrial IoT networks. The AAN and BS uses the communication parameter such as a route request (RREQ), node-ID, received signal strength (RSS), and round-trip time (RTT) information to… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2527-2546, 2021, DOI:10.32604/cmc.2021.013896
Abstract Flying ad hoc networks (FANETs) present a challenging environment due to the dynamic and highly mobile nature of the network. Dynamic network topology and uncertain node mobility structure of FANETs do not aim to consider only one path transmission. Several different techniques are adopted to address the issues arising in FANETs, from game theory to clustering to channel estimation and other statistical schemes. These approaches mostly employ traditional concepts for problem solutions. One of the novel approaches that provide simpler solutions to more complex problems is to use biologically inspired schemes. Several Nature-inspired schemes address cooperation and alliance which can… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3075-3087, 2021, DOI:10.32604/cmc.2021.014436
Abstract Pocket Switched Networks (PSN) represent a particular remittent network for direct communication between the handheld mobile devices. Compared to traditional networks, there is no stable topology structure for PSN where the nodes observe the mobility model of human society. It is a kind of Delay Tolerant Networks (DTNs) that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another. Considering its inception, there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.… More >