2023. 2nd Issue
Volume XV, Number 2
MESSAGE FROM THE EDITOR-IN-CHIEF
A note on using generative tools for research papers at the Infocommunications Journal
THERE is a new emerging trend of using large language modelbased applications – such as ChatGPT, Bard, Claude or LLama – in the research and innovation processes. This reaches from data processing through writing (parts of) reports to using them in reviewing scientific articles. The policy of Infocommunications Journal is to follow general guidelines of professionalism and the Codes of Conduct provided by ACM, IEEE and others. When it comes to the usage of ChatGPT and similar tools, they should be used as professional tools, as these make work easier. Still, authors should make sure that the output is scientifically supported and in general, true. When it comes to text editing, both authors and reviewers can use them for light textediting purposes. When authors generate text or multimedia content with such tools, it must be properly quoted and cited, following the publication rules that are anyway applicable for works not part of the authors’ contribution.
PAPERS FROM OPEN CALL
Marwah Haleem Jwair , and Taha A. Elwi
Metasurface Antenna Circuitry for 5G Communication Networks
In this article, the proposed antenna structure is designed for modern wireless communication systems. The antenna structure is consistent of twelve-unit metasurface (MTS) unit cells. Therefore, the antenna size is miniaturized effectively to 30×35mm2 which is equivalently about 0.2λo, where λo is the free space wavelength at 3.5GHz. This is achieved by conducting the use of Hilbert shape MTS structure with T-resonator induction structure. The antenna structure is printed on a single side substrate to cover the frequency bands from 3.15GHz-3.63GHz and 4.8GHz-5.1GHz. Such antenna is found to provide a maximum gain of 3.5dBi and 4.8dBi at 3.5GHz and 5Ghz, respectively. Next, proposed antenna is found to be circularly polarized at 3.5GHz and 5GHz. The proposed antenna performance is simulated numerically using CST MWS software package with all design methodology that is chosen to arrive to the optimal performance. Then, the optimal antenna design is tested numerically using HFSS software package for validation. Finally, an excellent agreement is achieved between the two conducted software results.
András Mihály, and László Bacsárdi
Optical transmittance based store and forward routing in satellite networks
Quantum computing will play a crucial part in our security infrastructure for the coming years. Quantum networks can consist of direct optical fiber or free-space links. With the use of satellite channels, we can create a quantum network with higher coverage than using optical fibers where the distances are limited due to the properties of the fiber. One of the highest drivers of cost for satellite networks, apart from the cost of the technology needed for such systems, are the costs of launching and maintaining said satellites. By minimizing the satellites needed for a well-functioning quantum network, we can decrease said network’s cost, thus enabling a cheaper quantum internet. In this paper, we present an optical transmittance-based routing algorithm with which it is possible to conduct successful quantum entanglement transfer between terrestrial nodes.
Naseer Al-Imareen, and Gábor Lencse
Effect of Path QoS on Throughput Aggregation Capability of the MPT Network Layer Multipath Communication Library
An increase in the use of smart and portable devices like smartphones, laptops, and tablets has led to a rise in the number of network interfaces and thus the number of possible channels for communication. However, the current approach over the Internet only employs a single path for a communication session. As an innovative and promising method for real-time transmission based on GRE-in-UDP encapsulation, which provides an IPv4 or IPv6 tunneling mechanism, this paper presents multipath throughput testing for the MPT network layer multipath communication library. We investigated the effectiveness of MPT's channel capacity aggregation while dealing with wired channels and examined scenarios in symmetric and asymmetric paths. Our network throughput measurements showed that MPT can efficiently aggregate the capacities of both symmetric and asymmetric paths. In this paper, we established a network topology that included a server, which we used for generating various quality of service (QoS) metrics. We measured how latency, transmission speed, packet loss rate, jitter, and the setting of the path weights influence throughput aggregation capability of the MPT communication library.
Gergely Hollósi, and István Moldován
Ultra Wideband-based wireless synchronization of IEEE 1588 clocks
Time-Sensitive Networking (TSN) requires clock synchronization superior to the well-known Network Time Protocol (NTP). The IEEE 802.1AS-2020 used for synchronization in TSN networks is based on the IEEE 1588-2019 standard (also known as Precision Time Protocol, PTP) defines methods and tools to perform sub-microsecond time synchronization over vari- ous communication channels. However, the IEEE 1588 implementation is commonly used with wired communication protocols, although there are use cases that could gain an advantage from a wireless solution. This paper investigates the possibility of PTP clock synchronization through wireless Ultra Wideband (UWB) communication. UWB excels where other wireless technologies are lacking: it provides high accuracy timestamping even if multipath propagation is present. The method is evaluated using commercial, well-accessible cheap hardware, resulting in the order of 10-nanosecond accuracy. The paper also highlights the main error components and requirements for improving wireless PTP synchronization.
Dubem Ezeh, Student Member, IEEE, and J. de Oliveira
An SDN controller-based framework for anomaly detection using a GAN ensemble algorithm
Of recent, a handful of machine learning techniques have been proposed to handle the task of intrusion detection with algorithms taking charge; these algorithms learn, from traffic flow examples, to distinguish between benign and anomalous network events. In this paper, we explore the use of a Generative Adversarial Network (GAN) ensemble to detect anomalies in a Software-Defined Networking (SDN) environment using the Global Environment for Network Innovations (GENI) testbed over geographically separated instances. A controllerbased framework is proposed, comprising several components across the detection chain. A bespoke dataset is generated, addressing three of the most popular contemporary network attacks and using an SDN perspective. Evaluation results show great potential for detecting a wide array of anomalies.
Sandor R. Repas
Performance Analysis of Encryption Capabilities of ARM-based Single Board Microcompute
In the few years since the Raspberry Pi was released in 2012, countless microcomputers based on the ARM architecture have been introduced.Their small size, high performance relative to their power consumption, and the ability to run the popular Linux operating system make them ideal for a wide range of tasks. Information security is an area of particular importance. Different encryption and encoding algorithms play an important role in almost all areas of information security. However, these algorithms are very computationally intensive, so it is important to investigate which microcomputers can be used for these tasks, and under which trade-offs. The performance of ten different microcomputers is investigated and presented for the application of common symmetric and public-key encryption and decryption, digest creation and message authentication protocols, such as RSA, AES, HMAC, MD5, SHA. Reliable encryption requires the generation of reliable (pseudo)random numbers (Cryptographically Secure Random Numbers, CSRN), and microcomputers based on ARM SoCs usually have hardware implemented (pseudo)random number generators. The applicability of the random number generat er generators. The applicability of the random number generators of different microcomputers are investigated and presented; test methoods are described , and recommendations are made.
Khadija Touya, Hamid Garmani, Mohamed Baslam, Rachid El Ayachi, and Mostafa Jourhmane
A game theoretic framework for controlling the behavior of a content seeking to be popular on social networking sites
Over the years, people are becoming more dependent on Online Social Networks, through whom they constitute various sorts of relationships. Furthermore, such areas present spaces of interaction among users; they send more messages and posts showing domains they are interested in to guarantee the level of their popularity. This popularity depends on its own rate, the number of comments the posted topic gets but; also on the cost a user has to pay to accomplish his task on this network. However, the selfish behavior of those subscribers is the root cause of competition over popularity among those users. In this paper, we aim to control the behavior of a social networks users who try their best to increase their popularity in a competitive manner. We formulate this competition as a non-cooperative game. We porpose an efficient game theoretical model to solve this competition and find a situation of equilibrium for the said game.