Next Article in Journal
Local Non-Similar Solution for Non-Isothermal Electroconductive Radiative Stretching Boundary Layer Heat Transfer with Aligned Magnetic Field
Next Article in Special Issue
Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things
Previous Article in Journal
Intermediate Isolation System with Nonlinear Lower Structure and Isolation System
Previous Article in Special Issue
Power Distribution IoT Tasks Online Scheduling Algorithm Based on Cloud-Edge Dependent Microservice
 
 
Article
Peer-Review Record

Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks

Appl. Sci. 2023, 13(7), 4591; https://doi.org/10.3390/app13074591
by Messaoud Benguenane 1,*, Ahmed Korichi 1, Bouziane Brik 2 and Nadjet Azzaoui 1
Reviewer 1:
Reviewer 2:
Appl. Sci. 2023, 13(7), 4591; https://doi.org/10.3390/app13074591
Submission received: 4 March 2023 / Revised: 2 April 2023 / Accepted: 3 April 2023 / Published: 5 April 2023
(This article belongs to the Special Issue Internet of Things Security: Latest Advances and Prospects)

Round 1

Reviewer 1 Report

The paper presents Towards Mitigating JellyFish Attacks based on Honesty Metric 2 in V2X Autonomous Networks, and the manuscript is well written. Overall, the authors have done an exemplary job in preparing the manuscript. However, I suggest further comments on specific aspects of the protocol or the manuscript. 

"The reason and motivation for the use of using honesty criterion mechanism to address the trusted paths is not very clear and it has to be justified. Make sure the abbreviations are mentioned the first time they are used. Your proposal scheme has been evaluated using OMNET++ simulations, it would be appreciated if you insert actual Simulation Scenario, where readers can visualize the original experiment. Add an insightful discussion of how this approach can help in real world scenario. it can also be interesting to discuss why the results are significant and how they add to existing knowledge compare to current techniques. The limitation of proposed approach are not clear. F.6 Flowchart has problem with flow please correct it. The complexity of the all proposed algorithms should be discussed. The (Conclusion) needs some "main" numerical values of the obtained results."

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Reviewer 2 Report

In this article study, the authors designed a new protocol that analyzes the behavior of each node in the network and calculates different metrics and selects reliable paths for data transmission to the targeted network. The OMNET++ simulator was used to evaluate the overall performance of the proposed protocol. The study is an important and critical application. The points that leave a question mark about the study and need improvement are listed below.

1- Real-time screen outputs and graphics obtained from the application moment are not presented in the article. Screenshots of real-time parameters made on the OmNet++ simulator used in the study should be presented.

2) The processes in the flow chart given in Figure 6 should be detailed for the protocol proposed in the study. Parameter selection, network flow, duration, time, layers, etc. Also, an algorithm must have a beginning and an end. However, there are missing points on the flowchart.

3) The simulation results on the OmNeT++ platform should be compared in a table according to different throughput values.

4) The organization of article should be reorganized and it should be traceable.

5) There are intermediate paragraphs in the text of the article that disrupt the integrity of meaning. Integrity has not been achieved.

6) The applications made for each different attack type should be given on a separate case and the validity and reliability tests should be examined.

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Round 2

Reviewer 1 Report

The authors have addressed all of the necessary changes.

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Back to TopTop