American Journal of Networks and Communications

Volume 13, Issue 1, June 2024

  • Research Article

    Virtualization of a 4G Evolved Packet Core Network Using Network Function Virtualization (NFV) Technology with NS3 for Enterprise and Educational Purpose

    Tonye Emmanuel, Deussom Djomadji Eric Michel*, Ebai Oben Brolynes Agbor

    Issue: Volume 13, Issue 1, June 2024
    Pages: 1-18
    Received: 2 February 2024
    Accepted: 22 February 2024
    Published: 7 March 2024
    Downloads:
    Views:
    Abstract: The current networks of many operators dispose an increasing variety of purpose built, vertically integrated, and vendor-locked hardware equipment. This makes it difficult to easily scale their radio access and core networks as it requires yet another variety of equipment, leading to increased Time-to-Market and inefficient resource utilization. Fu... Show More
  • Research Article

    A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems

    Santanam Kasturi*, Xiaolong Li, Peng Li, John Pickard

    Issue: Volume 13, Issue 1, June 2024
    Pages: 19-29
    Received: 5 February 2024
    Accepted: 22 February 2024
    Published: 7 March 2024
    Downloads:
    Views:
    Abstract: This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper... Show More
  • Research Article

    Genetic Algorithm for Mode Selection in Device-to-Device (D2D) Communication for 5G Cellular Networks

    Eric Michel Deussom Djomadji*, Maniba Garga, Bienvenue Arsene Roger Fouba, Thomas Bouetou Bouetou

    Issue: Volume 13, Issue 1, June 2024
    Pages: 30-43
    Received: 5 February 2024
    Accepted: 23 February 2024
    Published: 7 March 2024
    Downloads:
    Views:
    Abstract: The widespread use of smart devices and mobile applications is leading to a massive growth of wireless data traffic. With the rapidly growing of the customers’ data traffic demand, improving the system capacity and increasing the user throughput have become essential concerns for the future fifth-generation (5G) wireless communication network. In a... Show More
  • Research Article

    Wifi Pentesting Roadmap for Classic-Future Attacks and Defenses

    Ramafiarisona Hajasoa Malalatiana, Rakotondramanana Radiarisainana Sitraka*

    Issue: Volume 13, Issue 1, June 2024
    Pages: 44-63
    Received: 20 February 2024
    Accepted: 5 March 2024
    Published: 20 March 2024
    DOI: 10.11648/j.ajnc.20241301.14
    Downloads:
    Views:
    Abstract: The most advanced attack on the Wireless Fidelity (WIFI) network uses social engineering. The hacker makes portal captive and forces the victim for disconnecting to internet instead of entering the real password of the WIFI. In normal actions, asking WIFI password on the web interface is not the real process, but sometimes the victim is not experie... Show More
  • Research Article

    Trajectory Optimization and Power Allocation Scheme for a UAV Relay-aided Network in the Presence of an Eavesdropper

    Jishan E Giti*, Shah Ariful Hoque Chowdhury, Al-Hadith Moon

    Issue: Volume 13, Issue 1, June 2024
    Pages: 64-74
    Received: 22 March 2024
    Accepted: 22 April 2024
    Published: 27 May 2024
    DOI: 10.11648/j.ajnc.20241301.15
    Downloads:
    Views:
    Abstract: The information theoretical security for a cellular network in the presence of an eavesdropper is investigated in this research. The network is single-input-single-output (SISO) in nature. A small unmanned aerial vehicle (UAV) is aiding the network as a relay that follows the decode-and-forward (DF) protocol. The relay decodes the transmitted signa... Show More
  • Research/Technical Note

    Mobility Management in Next Generation Wireless Networks

    Md. Shohidul Islam*, Shah Ariful Hoque Chowdhury

    Issue: Volume 13, Issue 1, June 2024
    Pages: 75-83
    Received: 20 April 2024
    Accepted: 28 May 2024
    Published: 12 June 2024
    DOI: 10.11648/j.ajnc.20241301.16
    Downloads:
    Views:
    Abstract: Living in a modern society without smart devices is impossible now a days. Every sector related to human lifestyle is either smart or controlled devices which was rare a decade back. Expectations are not limited to network connection but extend to mobility as well. As a result, mobility management becomes an essential and challenging task to accomp... Show More