https://ojs.wiserpub.com/index.php/CNC/issue/feed Computer Networks and Communications 2024-03-04T11:50:32+08:00 CNC Editorial Office cnc@universalwiser.com Open Journal Systems <p><em>Computer Networks and Communications </em>(<a href="https://ojs.wiserpub.com/index.php/CNC/" target="_blank" rel="noopener"><em>CNC</em></a>) is an international, peer-reviewed, open access journal in science and technology for original research papers focused on networks and communications, published biannually online by Universal Wiser Publisher (<a href="https://www.wiserpub.com/" target="_blank" rel="noopener">UWP</a>).</p> <p><strong>&gt;</strong> fully open access - free for readers<br /><strong>&gt;</strong> no article processing charge (APC) paid by authors or their institutions until 2025<br /><strong>&gt;</strong> thorough double-blind peer-review<br /><strong>&gt;</strong> free post-publication promotion service by the Editorial Office</p> https://ojs.wiserpub.com/index.php/CNC/article/view/4057 Channel Precoding for Compute and Forward Relaying in Two Way Relay Network Model 2024-03-04T11:50:32+08:00 Jeyalakshmi Vijayarajan jeyalakshmiv@mepcoeng.ac.in S. Tamil Selvi stsece@nec.edu.in <p>Physical layer Network Coding (PNC) is a promising strategy to improve the spectral efficiency in a relay-based wireless transmission. This paper employs lattice-based channel coding at the source nodes for better performance during Multiple Access Channel (MAC) phase transmission. The achievable transmission rate in various PNC relaying such as Decode and Forward (DF), Amplify and Forward (AF), and Compute and Forward (CF) for the Two Way Relay Network model (TWRN) is derived and simulated through MATLAB software and analyzed. The analysis shows that the rate performance of CF relaying outperforms other relaying techniques in the Additive White Gaussian Noise (AWGN) channel, but it degrades for the Rayleigh fading channel. To mitigate the fading effects, channel aware precoding technique is employed at source nodes, Bit Error Rate (BER) and Symbol Error Rate (SER) performance are analyzed for CF relaying, and Monte Carlo simulations are used to demonstrate the theoretical results. Channel precoding performance of CF relaying is compared with DF relaying.</p> 2024-03-29T00:00:00+08:00 Copyright (c) 2024 Jeyalakshmi Vijayarajan, et al. https://ojs.wiserpub.com/index.php/CNC/article/view/3929 A Framework for Security Assessment of Android Mobile Banking Applications 2024-02-01T11:22:27+08:00 Loïc D. Tsobdjou loic.tsobdjou-dongmo@polymtl.ca Samuel Pierre samuel.pierre@polymtl.ca Alejandro Quintero alejandro.quintero@polymtl.ca <div> <p>Mobile banking applications make users' daily lives easier by allowing them to access banking services, such as balance inquiries and bill payments, anytime and anywhere. Since these applications manage very sensitive financial data, special attention must be paid to data security. Several works in the literature assess the security of mobile banking applications. However, we observe the lack of a widely adopted framework among researchers for assessing the security of mobile banking applications. In this paper, we propose a framework consisting of twenty-six criteria for assessing the security of Android mobile banking applications. These criteria are divided into five categories: mobile device security, data in transit, data storage, cryptographic misuse, and others. Subsequently, we evaluate the proposed framework based on predefined requirements. These requirements are no redundancy, no ambiguity, and comprehensiveness. As a case study, we assess the security of the Android mobile banking applications of seven major Canadian banks. The results show that data in transit is adequately protected by these applications.</p> </div> 2024-03-07T00:00:00+08:00 Copyright (c) 2024 Loïc D. Tsobdjou, et al. https://ojs.wiserpub.com/index.php/CNC/article/view/3852 Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review 2023-12-18T15:18:56+08:00 Ranjit Kaur 18166138@student.westernsydney.edu.au Seyed Shahrestani S.Shahrestani@westernsydney.edu.au Chun Ruan C.Ruan@westernsydney.edu.au <p>Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare to monitor health data. However, when WWSN users transmit their data to healthcare professionals or third parties over wireless connections, they face privacy and security vulnerabilities. This paper aims to identify the unsolved privacy and security challenges in wearable sensor devices in healthcare, especially the aspects overlooked by previous research. The main research question is: What are the unsolved privacy and security challenges in wearable sensor devices in healthcare, and what are their implications for users and healthcare professionals? This systematic review employs specific keywords to search for relevant publications on bibliographic databases, including Google Scholar, Scopus, IEEE Xplore, and Web of Science. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) charts helped in screening and summarising the selected papers. The results highlight the critical areas that can make WWSNs vulnerable to security attacks. The findings examine the security and privacy issues of wearable sensor devices in cloud computing, fog computing, the Internet of Things (IoT) and the like. Many studies examine IoT due to its privacy and security challenges, especially regarding handling extensive data, using public channels, deploying advanced technologies, managing sharing policies alongside the growing number of wireless devices, and protecting data from hackers. These challenges seriously threaten the confidentiality, integrity, and availability of health data transmitted by WWSN users to healthcare professionals or third parties in cloud-based environments and IoT and are exacerbated by limited resources. The significant findings thereby focus on unresolved areas in IoT. This paper aims to safeguard against cyber-attacks on healthcare and increase users' adoption rate of WWSN devices.</p> 2024-02-05T00:00:00+08:00 Copyright (c) 2024 Ranjit Kaur, et al. https://ojs.wiserpub.com/index.php/CNC/article/view/3999 Mechanism for Efficient Media Propagation in Event-Driven Cyber-Physical Systems 2024-01-04T09:18:28+08:00 Rolando Herrero rolando.herrero@northeastern.edu <p>Many key applications in Cyber-Physical Systems require the transmission of speech, audio, or video. These scenarios involve the use of traditional Real-Time Communication (RTC) protocols and technologies, which cannot always be used in the context of core networks. This is particularly critical in the context of Event-Driven Architectures (EDAs), where RTC protocols require the use of complex topologies that rely on costly infrastructure. One way to avoid this is by encapsulating all media traffic in EDA protocols. However, this approach does not come without challenges. Specifically, the nature of the transport protocols causes the media to be heavily affected by application layer impairments that render their usage highly impractical. To prevent this from happening, this paper introduces a unified scheme that supports the efficient encapsulation of media traffic in EDA scenarios. This is accomplished through a mechanism that relies on a Machine Learning (ML) model that is exercised in an experimental framework.</p> 2024-01-26T00:00:00+08:00 Copyright (c) 2024 Rolando Herrero https://ojs.wiserpub.com/index.php/CNC/article/view/4017 Channel Model for CM-3 Scenario Over Generalized Distribution Under Various Window Functions 2024-01-01T22:37:11+08:00 Shekhar Singh shekharsingh529@gmail.com S. Pratap Singh drsprataps@gmail.com Lakshmanan M amitkatyal101@gmail.com <p>In terms of fundamental research and technology development level, Wireless Body Area Network (WBAN) is a well-established paradigm of wireless system. However, like any wireless system, channel modeling of WBAN is one of the most challenging research eras. Also, literature suggests Channel Model-3, termed as CM-3 scenario based on the positioning of the Nano antenna, is one of the most useful deployment scenarios of WBAN. Further, arrival time and the number of arrivals, which plays an important role in the CM-3 scenario of WBAN, are modeled using the Poisson distribution. However, in Poisson distribution the variance and mean are equal and the probability of success is kept fixed. Hence, the versatility of the channel model based Poisson distribution is limited due to limited parameters. On the other hand, Negative Binomial (NB) distribution with extra parameters is a more general distribution. Therefore, this manuscript employs Negative Binomial distribution to present a more general channel model under the CM-3 scenario. In addition, effects of different windowing techniques, such as Bartlett and Gaussian window, on the channel model are analyzed under both, Poisson distribution and Negative Binomial distributions.</p> 2024-01-22T00:00:00+08:00 Copyright (c) 2024 Shekhar Singha, et al.