Wijesekara, Patikiri Arachchige Don Shehan Nilmantha
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : The Indonesian Journal of Computer Science

A Literature Review on Access Control in Networking Employing Blockchain Wijesekara, Patikiri Arachchige Don Shehan Nilmantha
The Indonesian Journal of Computer Science Vol. 13 No. 1 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i1.3764

Abstract

Access Control (AC) in networking attempts to make sure that only authorized devices perform actions formed upon privileges defined for them with a view to prevent malicious users' entry and interaction in the communication grid. Blockchain solutions contain an arrangement of related blocks that naturally safeguards the trustworthiness, defending the incontestability, defend masked-identity of its transactions/transfers due to scattered consensus strategies and cryptographic solutions. Our survey comprehensively reviews BC-formed AC in broad scope of networking considering AC techniques while breaking down into 4 propositions and assessing them in terms of blockchain roles, AC technique and approach, network elements, and rest. We stockpiled a primary sample of 79 bibliographic references by weeding out them for screening criteria sought from scientific information reservoirs exploiting a qualitative and extensive strategy. Formed upon this survey, in blockchain-formed AC, blockchain can be exploited as an AC manager to administrate network devices and access information, implement automatic AC by means of smart contracts, secure storage of AC related data to reinforce overall AC security, and for safe data exchanging in the operation of AC. Minute assessment highlights that from blockchain-formed AC, 52.5% provide AC using blockchain itself or using smart contracts, 92.5% exploit sequential blockchain, 35% exploit PBFT consensus, provide 100% fine-grained and host-formed AC, 85% decentralized AC, 87.5% have single-factor authentication, 92.5% provide dynamic AC, and 45% have opted for IoT. Finally, we evaluate the chances and difficulties of the principle of blockchain-formed AC and then giving recommended actions to beat them.
A Review of Blockchain-Rooted Energy Administration in Networking Wijesekara, Patikiri Arachchige Don Shehan Nilmantha
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3818

Abstract

Energy Administration (EA) in networking involves improving energy efficiency by managing energy. The blockchain framework involves a chain of associated blocks that obviously protects the genuineness, upholds accountability, and upholds disguised-anonymity of its transactions/entries with the help of peer-to-peer consensus techniques and cryptographic mechanisms. Driven by the fact that existing surveys do not focus on the EA in the broad scope of networking, we review diverse blockchain-rooted EA solutions, where we recognize 7 roles of blockchain in EA and explore them in detail with regard to EA techniques, EA approaches, blockchain-linked factors, network-linked factors, and such. We assembled a first-stage sample of 80 document citations by appraising the articles for qualification criteria hunted from E-libraries operating a detailed and prolonged process. Considering the review, in blockchain-rooted EA, blockchain can facilitate storing and exchanging data in a trustworthy manner, operate energy-efficient consensus approaches, act as an energy manager, provide authentication and access control for EA, facilitate secure offloading for EA, and provide automated EA tasks operating smart contracts. Detailed exploration shows that from blockchain-rooted EA, 32.5% operate blockchain to store and exchange data for an EA task, 95% operate uniform blockchain, 30% operate PoW consensus, 82.5% operate fully decentralized EA, 57.5% operate cross-layer EA, and 10% operate in IoT networks. Finally, we debate the possibilities and barriers to the conception of blockchain-rooted EA and then present guidance to vanquish them.
Towards Efficient and Reliable Video Communication: A Survey on Scalability, Error Protection, and Multicasting Wijesekara, Patikiri Arachchige Don Shehan Nilmantha
The Indonesian Journal of Computer Science Vol. 14 No. 1 (2025): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v14i1.4639

Abstract

Efficient and reliable video communication is required to maintain high-quality and uninterrupted streaming in order to minimize bandwidth usage and to tackle network variability. Scalable Video Coding (SVC) introduces efficiency for video communication by introducing a base layer and a set of enhancement layers, while Unequal Error Protection (UEP) can provide high protection to important layers while having low redundancy for less important layers/bits/frames. Moreover, scalable video transmission’s efficiency can be further improved by multicasting a video to multiple recipients simultaneously over a network efficiently, where each user can adapt to network conditions. As existing surveys do not concentrate on discussing the improving efficiency and reliability of video communication by multicasting scalable video communication focusing on UEP, we review these factors individually and in combination. We first gathered 113 original research studies using qualification criteria searched using electronic libraries, leveraging an elaborative process. As per the review, video scalability has been achieved using temporal scalability, spatial scalability with spatial resolution, quality scalability using quantization steps, and slice grouping for region of interest scalability, while UEP is achieved using transceiver, packet level, bit level, and cross-layer methods. Moreover, simulcast, multiple access techniques, multi-resolution modulation, and antenna heterogeneity have shown to be the promising SVC multicasting techniques. Review analysis shows that from reviewed work, 10.3% provide H.265-based scalability, 19.2% use transceiver UEP, and 7.7% use simulcast. Finally, we conclude our review by discussing the advantages and challenges of the concept of SVC-UEP video communication and then presenting guidance to overcome them.