Submit a Manuscript to the Journal

Journal of the Chinese Institute of Engineers

For a Special Issue on

Communication technologies for security implementations in all network layers

Manuscript deadline
15 June 2024

Cover image - Journal of the Chinese Institute of Engineers

Special Issue Editor(s)

Prof. Chen-Yi Lee, National Yang Ming Chiao Tung University, Taiwan
[email protected]

Dr. Tarek Moulahi, Qassim University, Saudi Arabia
[email protected]

Dr. Rateb Jabbar, Qatar University, Qatar
[email protected]

Dr. Musab Al-Ghadi, La Rochelle University, France
[email protected]

Submit an ArticleVisit JournalArticles

Communication technologies for security implementations in all network layers

Utilisation of computerised industrial automation has fast spread throughout the industrial sector. Emerging techniques offer effective instruments for developing efficient, lucrative, and statistics production methods. An assessment of different sensor techniques for production methods is presented after a discussion of smart factories trends and an introduction to computer crimes platforms. For integrating various automation, many communications are discussed and introduced. The topic of configurable topologies is covered, and techniques for system supervision are shown as demonstrations. Furthermore, an assessment of several of these routing protocols' and designs' applications is conducted, and including suggestions for next design deployments. The construction sector is seeing a massive shift led to the massive use of increased modern telecommunication interfaces and enormous improvements in computing voice and data retention. Substantial progress in information gathering, collaboration, and evaluation throughout supply chains were made possible by any of these innovations.

Modern applications are linked with healthcare services through the Internet of Medical Things (IoMT) to provide genuine, telemonitoring and management. Nevertheless, because vital surgical instruments are interconnected with others that appear at different internet tiers, faraway enemies have additional options to attack. It is necessary to categorise the existing IoT connection techniques according to cybersecurity because the majority of routing protocols haven't been particularly created to meet the requirements of linked implantable implants.  Combination of residential and sophisticated smaller applications using Home Area Networks (HAN) wireless networks. A Gateways focused on machine-to-machine (M2M) telecommunications that engages with the surroundings is used as a fundamental component in the analysis of a broad and inclusive home standard interface. The applicability of the major cellular connections to HAN criteria is then evaluated while taking into account the potential application. A qualitative analysis is then presented.

Mostly on the basis of the research from the research, the purpose of employing Sensor innovations in consumer devices, the problems associated with implementation restriction, and the evolution and use of building automation are then investigated. The connectivity principles and principles of this ’s regulatory IoT solutions, modulation schemes, IoT layering interface, and the level of service for IoT-based home automation, were reviewed. There is discussion about the technical community at large techniques and general agenda. Today's world, there are a number of M2M devices on the market, whether as commercial software or the result of standardisation efforts. Every one of these techniques is aimed at a given category of Internet of things and is distinguished by distinctive elements in terms of obtainable effectiveness, recurrence of use, and endorsed network architectures.

Potential topics include, but are not limited to:

  • The goal of Delay-Tolerant Networking (DTN) seems to be to allow for standardised connectivity across huge distances and during disruptions.
  • Several hundred thousand datagrams are sent through network technologies.
  • A communications system which utilises mobile internet links among edge devices is referred to as a cellular connection.
  • Z-Wave is the market leader in wireless control but is a wifi module enabling connecting smart things equipment.
  • Total internal reflection, distortion, and dispersion, directional antennas have varying properties.
  • Roads and bridges offer protection from a variety of assaults.
  • Effective interaction between designated locations are made possible by Advanced Metering Infrastructure (AMI).
  • Smart grids enable energy suppliers access to emerging markets while lowering operating expenses.
  • Boost communication strength to maintain power transmission dependability.
  • Intelligent transportation systems aid with easing traffic, enhancing gas mileage, and increasing protection
  • Some theoretical foundation, comprising interfaces, along with all the necessary equipment and software, were required to establish a digital assistant.

Submission Instructions

  • The manuscript submitted should be single-column, double-spaced, 30 pages including figures and illustrations for a full paper. The font size should be 11 points.
  • Please select the special issue title "Communication technologies for security implementations in all network layers" when submitting your paper to Submission Portal.
  • Please sign a “Page Charge Form” and “Copyright Agreement”, and upload these forms by submission Portal. You have to sign on the “Page Charge Form” and “Copyright Agreement” by yourself. Please don't just key in your name.

Instructions for AuthorsSubmit an Article