首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Security, Privacy, and Trust Management on Decentralized Systems and Networks 分散式系统和网络的安全、隐私和信任管理
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-15 DOI: 10.1002/nem.2311
Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen
<p>With the rapid growth of size and scale in current organization, decentralize systems are becoming dominant, which is an interconnected information system where no single entity or central server is employed as a sole authority, such as Internet of Things (IoT), smart home system, smart city system, and more. For such systems, sensors are important to gather and process data as the lower level components. However, with the distributed deployment, decentralized systems are facing various security, privacy, and trust issues. For instance, any compromised sensor may leak sensitive data or be used to infect other entities within the system. It is also a long-term challenge to establish trust among different nodes and defeat malicious insiders. Here, there is a requirement to develop suitable management schemes for decentralized systems and networks regarding security, privacy, and trust. This special issue focuses on the identification of security, privacy, and trust issues in decentralized systems and the development of effective solutions in handling security, privacy, and trust issues for decentralized systems, for example, IoT, cyber-physical systems (CPS), smart city, and smart home.</p><p>In the first contribution entitled “A security-enhanced equipment predictive maintenance solution for the ETO manufacturing,” Cao et al. proposed a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. This scheme can use the industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructing prediction models using machine learning methods and reinforcing the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%.</p><p>In the second contribution entitled “IGXSS: XSS payload detection model based on inductive GCN,” Wang et al. figured out that XSS is one of the most common web application attacks, in which an attacker can obtain private user information from IoT devices or cloud platforms. To address this issue, the authors proposed an XSS payload detection model based on inductive graph neural networks, shortly IGXSS (XSS payload detection model based on inductive GCN). The method aims to detect XSS payloads under an IoT environment by segmenting the samples as nodes and obtaining the feature matrix of nodes and edges.</p><p>In the third contribution entitled “Privacy-protected object detection through trustworthy image fusion,” Zhang et al. identified that user privacy may be leaked as infrared images may contain sensitive information. The authors then proposed a procedure for enhancing the database privacy, object detection based on multi-band infrared image datasets, and they utilized the transfer learning technique to migrate know
随着当前组织规模的快速增长,去中心化系统正成为主流,这是一种互联的信息系统,没有单一实体或中央服务器作为唯一权威,如物联网(IoT)、智能家居系统、智能城市系统等。对于此类系统,传感器作为底层组件,在收集和处理数据方面非常重要。然而,随着分布式部署的开展,分散式系统正面临着各种安全、隐私和信任问题。例如,任何受损的传感器都可能泄露敏感数据或被用来感染系统内的其他实体。在不同节点之间建立信任并击败恶意内部人员也是一项长期挑战。因此,有必要为分散式系统和网络开发合适的安全、隐私和信任管理方案。在第一篇题为《面向 ETO 制造业的安全增强型设备预测性维护解决方案》的论文中,Cao 等人提出了一种专为 ETO 型生产设备设计的安全增强型预测性维护方案。该方案可利用工业物联网(IIoT)技术监控机器设备,利用机器学习方法构建预测模型,并通过采用区块链分布式存储的去中心化架构来加强预测系统的安全性。在题为 "IGXSS:基于感应式GCN的XSS有效载荷检测模型 "的第二篇论文中,Wang等人发现XSS是最常见的网络应用攻击之一,攻击者可以从物联网设备或云平台获取用户隐私信息。为解决这一问题,作者提出了一种基于归纳图神经网络的 XSS 有效载荷检测模型,即 IGXSS(基于归纳图神经网络的 XSS 有效载荷检测模型)。该方法旨在通过将样本分割为节点,并获取节点和边的特征矩阵,从而检测物联网环境下的 XSS 有效载荷。在题为 "通过可信图像融合实现隐私保护对象检测 "的第三篇论文中,Zhang 等人指出,由于红外图像可能包含敏感信息,用户隐私可能会被泄露。作者随后提出了一种基于多波段红外图像数据集的增强数据库隐私、物体检测的程序,并利用迁移学习技术将从外部红外数据中学到的知识迁移到内部红外数据中。所提出的方法由几个步骤组成,包括多波段红外图像的数据预处理、多波段红外图像融合和物体检测。Manikandan 和 Sriramulu 在题为 "ASMTP:基于匿名安全信息令牌的协议辅助无人驾驶飞行器群的数据安全 "的第四篇论文中指出,在无人驾驶飞行器与无人驾驶飞行器(UAV-to-UAV)通信过程中,需要完美的前向保密性和不可抵赖性。作者提出了一种基于匿名安全信息令牌协议(ASMTP)的无人机蜂群通信协议。在题为 "智能电网中实现数据查询完整性的隐私保护数据聚合 "的第五篇论文中,Li 等人指出,智能电网系统应优先考虑隐私和安全问题。作者提出了一种旨在支持数据查询的隐私保护数据聚合方案。他们还开发了一种基于 Paillier 半同态加密的多级数据聚合机制,以便在控制中心实现用户数据的高效聚合。在题为 "医疗物联网框架中的安全和轻量级患者生存预测 "的第六篇论文中,Mittal 等人旨在探索客观数据和主观数据在预测术后结果中的相互作用,并以此帮助降低医疗物联网中的数据传输成本。
{"title":"Security, Privacy, and Trust Management on Decentralized Systems and Networks","authors":"Weizhi Meng,&nbsp;Sokratis K. Katsikas,&nbsp;Jiageng Chen,&nbsp;Chao Chen","doi":"10.1002/nem.2311","DOIUrl":"https://doi.org/10.1002/nem.2311","url":null,"abstract":"&lt;p&gt;With the rapid growth of size and scale in current organization, decentralize systems are becoming dominant, which is an interconnected information system where no single entity or central server is employed as a sole authority, such as Internet of Things (IoT), smart home system, smart city system, and more. For such systems, sensors are important to gather and process data as the lower level components. However, with the distributed deployment, decentralized systems are facing various security, privacy, and trust issues. For instance, any compromised sensor may leak sensitive data or be used to infect other entities within the system. It is also a long-term challenge to establish trust among different nodes and defeat malicious insiders. Here, there is a requirement to develop suitable management schemes for decentralized systems and networks regarding security, privacy, and trust. This special issue focuses on the identification of security, privacy, and trust issues in decentralized systems and the development of effective solutions in handling security, privacy, and trust issues for decentralized systems, for example, IoT, cyber-physical systems (CPS), smart city, and smart home.&lt;/p&gt;&lt;p&gt;In the first contribution entitled “A security-enhanced equipment predictive maintenance solution for the ETO manufacturing,” Cao et al. proposed a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. This scheme can use the industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructing prediction models using machine learning methods and reinforcing the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%.&lt;/p&gt;&lt;p&gt;In the second contribution entitled “IGXSS: XSS payload detection model based on inductive GCN,” Wang et al. figured out that XSS is one of the most common web application attacks, in which an attacker can obtain private user information from IoT devices or cloud platforms. To address this issue, the authors proposed an XSS payload detection model based on inductive graph neural networks, shortly IGXSS (XSS payload detection model based on inductive GCN). The method aims to detect XSS payloads under an IoT environment by segmenting the samples as nodes and obtaining the feature matrix of nodes and edges.&lt;/p&gt;&lt;p&gt;In the third contribution entitled “Privacy-protected object detection through trustworthy image fusion,” Zhang et al. identified that user privacy may be leaked as infrared images may contain sensitive information. The authors then proposed a procedure for enhancing the database privacy, object detection based on multi-band infrared image datasets, and they utilized the transfer learning technique to migrate know","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2311","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization 基于点-群特征泛化的网络空间资源隐喻图构建
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1002/nem.2306
Yifan Liu, Heng Zhang, Yang Zhou, Kai Qi, Qingxiang Li

In the digital age, the expansion of cyberspace has resulted in increasing complexity, making clear cyberspace visualization crucial for effective analysis and decision-making. Current cyberspace visualizations are overly complex and fail to accurately reflect node importance. To address the challenge of complex cyberspace visualization, this study introduces the integrated centrality metric (ICM) for constructing a metaphorical map that accurately reflects node importance. The ICM, a novel node centrality measure, demonstrates superior accuracy in identifying key nodes compared to degree centrality (DC), k-shell centrality (KC), and PageRank values. Through community partitioning and point-cluster feature generalization, we extract a network's hierarchical structure to intuitively represent its community and backbone topology, and we construct a metaphorical map that offers a clear visualization of cyberspace. Experiments were conducted on four original networks and their extracted backbone networks to identify core nodes. The Jaccard coefficient was calculated considering the results of the three aforementioned centrality measures, ICM, and the SIR model. The results indicate that ICM achieved the best performance in both the original networks and all extracted backbone networks. This demonstrates that ICM can more precisely evaluate node importance, thereby facilitating the construction of metaphorical maps. Moreover, the proposed metaphorical map is more convenient than traditional topological maps for quickly comprehending the complex characteristics of networks.

在数字时代,网络空间的扩展导致复杂性不断增加,因此清晰的网络空间可视化对于有效的分析和决策至关重要。目前的网络空间可视化过于复杂,无法准确反映节点的重要性。为应对复杂的网络空间可视化挑战,本研究引入了综合中心度量(ICM),用于构建能准确反映节点重要性的隐喻地图。ICM 是一种新型节点中心度量,与度中心度 (DC)、k-shell 中心度 (KC) 和 PageRank 值相比,在识别关键节点方面具有更高的准确性。通过社区划分和点簇特征泛化,我们提取了网络的层次结构,直观地表示了其社区和骨干拓扑结构,并构建了一个隐喻地图,提供了网络空间的清晰可视化。我们在四个原始网络及其提取的骨干网络上进行了实验,以识别核心节点。根据上述三种中心性度量、ICM 和 SIR 模型的结果,计算了 Jaccard 系数。结果表明,ICM 在原始网络和所有提取的骨干网络中都取得了最佳性能。这表明 ICM 可以更精确地评估节点的重要性,从而促进隐喻图的构建。此外,与传统拓扑图相比,所提出的隐喻图更便于快速理解网络的复杂特性。
{"title":"Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization","authors":"Yifan Liu,&nbsp;Heng Zhang,&nbsp;Yang Zhou,&nbsp;Kai Qi,&nbsp;Qingxiang Li","doi":"10.1002/nem.2306","DOIUrl":"https://doi.org/10.1002/nem.2306","url":null,"abstract":"<div>\u0000 \u0000 <p>In the digital age, the expansion of cyberspace has resulted in increasing complexity, making clear cyberspace visualization crucial for effective analysis and decision-making. Current cyberspace visualizations are overly complex and fail to accurately reflect node importance. To address the challenge of complex cyberspace visualization, this study introduces the integrated centrality metric (ICM) for constructing a metaphorical map that accurately reflects node importance. The ICM, a novel node centrality measure, demonstrates superior accuracy in identifying key nodes compared to degree centrality (DC), k-shell centrality (KC), and PageRank values. Through community partitioning and point-cluster feature generalization, we extract a network's hierarchical structure to intuitively represent its community and backbone topology, and we construct a metaphorical map that offers a clear visualization of cyberspace. Experiments were conducted on four original networks and their extracted backbone networks to identify core nodes. The Jaccard coefficient was calculated considering the results of the three aforementioned centrality measures, ICM, and the SIR model. The results indicate that ICM achieved the best performance in both the original networks and all extracted backbone networks. This demonstrates that ICM can more precisely evaluate node importance, thereby facilitating the construction of metaphorical maps. Moreover, the proposed metaphorical map is more convenient than traditional topological maps for quickly comprehending the complex characteristics of networks.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV 基于区块链的代理重加密方案与物联网加密反向防火墙
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-07 DOI: 10.1002/nem.2305
Chunhua Jin, Zhiwei Chen, Wenyu Qin, Kaijun Sun, Guanhua Chen, Liqing Chen

As the internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle information security challenges. In recent years, vehicle data sharing is suffering to algorithm substitution attacks (ASA), which means backdoor adversaries can carry out filtering attacks through data sharing. Therefore, this paper designs a blockchain-based proxy re-encryption (PRE) scheme with cryptographic reverse firewall (BIBPR-CRF) for IoV. In our proposal, CRF can promise the internal safety of vehicle units. More specifically, it can prevent ASA attacks while ensuring chosen plaintext attack (CPA)-security. Meanwhile, the PRE algorithm can provide the confidential sharing and secure operation of data. Moreover, we use a consortium blockchain service center (CBSC) to store the first ciphertext and re-encrypt it with smart contracts on the blockchain, which can avoid single point of failure and achieve higher efficiency compared to proxy servers. Finally, we evaluate the performance of BIBPR-CRF with regard to communication cost, computational cost, and energy consumption. Our proposal is the most fitting for IoV application, in contrast with the other three schemes.

随着车联网(IoV)技术的发展,它促进了车辆、路边装置和环境之间的智能互动。然而,它也带来了车辆信息安全方面的挑战。近年来,车辆数据共享受到算法替换攻击(ASA)的影响,即后门对手可以通过数据共享进行过滤攻击。因此,本文为物联网设计了一种基于区块链的代理重加密(PRE)方案和加密反向防火墙(BIBPR-CRF)。在我们的建议中,CRF 可以保证车辆的内部安全。更具体地说,它可以防止 ASA 攻击,同时确保选择明文攻击(CPA)的安全性。同时,PRE 算法可以提供数据的保密共享和安全操作。此外,我们使用联盟区块链服务中心(CBSC)来存储第一份密文,并通过区块链上的智能合约进行重新加密,这样可以避免单点故障,与代理服务器相比效率更高。最后,我们评估了 BIBPR-CRF 在通信成本、计算成本和能耗方面的性能。与其他三种方案相比,我们的建议最适合物联网应用。
{"title":"A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV","authors":"Chunhua Jin,&nbsp;Zhiwei Chen,&nbsp;Wenyu Qin,&nbsp;Kaijun Sun,&nbsp;Guanhua Chen,&nbsp;Liqing Chen","doi":"10.1002/nem.2305","DOIUrl":"https://doi.org/10.1002/nem.2305","url":null,"abstract":"<div>\u0000 \u0000 <p>As the internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle information security challenges. In recent years, vehicle data sharing is suffering to algorithm substitution attacks (ASA), which means backdoor adversaries can carry out filtering attacks through data sharing. Therefore, this paper designs a blockchain-based proxy re-encryption (PRE) scheme with cryptographic reverse firewall (BIBPR-CRF) for IoV. In our proposal, CRF can promise the internal safety of vehicle units. More specifically, it can prevent ASA attacks while ensuring chosen plaintext attack (CPA)-security. Meanwhile, the PRE algorithm can provide the confidential sharing and secure operation of data. Moreover, we use a consortium blockchain service center (CBSC) to store the first ciphertext and re-encrypt it with smart contracts on the blockchain, which can avoid single point of failure and achieve higher efficiency compared to proxy servers. Finally, we evaluate the performance of BIBPR-CRF with regard to communication cost, computational cost, and energy consumption. Our proposal is the most fitting for IoV application, in contrast with the other three schemes.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk-Aware SDN Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning 利用安全强化学习对抗反蜜罐攻击的风险意识 SDN 防御框架
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.1002/nem.2297
Dongying Gao, Caiwei Guo, Yi Zhang, Wen Ji, Zhilei Lv, Zheng Li, Kunsan Zhang, Ruibin Lin

The development of multiple attack methods by external attackers in recent years poses a huge challenge to the security and efficient operation of software-defined networks (SDN), which are the core of operational controllers and data storage. Therefore, it is critical to ensure that the normal process of network interaction between SDN servers and users is protected from external attacks. In this paper, we propose a risk-aware SDN defense framework based on safe reinforcement learning (SRL) to counter multiple attack actions. Specifically, the defender uses SRL to maximize the utility by choosing to provide a honeypot service or pseudo-honeypot service within predefined security constraints, while the external attacker maximizes the utility by choosing an anti-honeypot attack or masquerade attack. To describe the system risk in detail, we introduce the risk level function to model the simultaneous dynamic attack and defense processes. Simulation results demonstrate that our proposed risk-aware scheme improves the defense utility by 17.5% and 142.4% and reduces the system risk by 42.7% and 59.6% compared to the QLearning scheme and the Random scheme, respectively.

近年来,外部攻击者开发出多种攻击手段,对作为运行控制器和数据存储核心的软件定义网络(SDN)的安全和高效运行提出了巨大挑战。因此,确保 SDN 服务器与用户之间正常的网络交互过程免受外部攻击至关重要。本文提出了一种基于安全强化学习(SRL)的风险感知 SDN 防御框架,以应对多种攻击行为。具体来说,防御者利用 SRL 在预定义的安全约束条件下选择提供蜜罐服务或伪蜜罐服务,从而实现效用最大化;而外部攻击者则通过选择反蜜罐攻击或伪装攻击来实现效用最大化。为了详细描述系统风险,我们引入了风险等级函数来模拟同时进行的动态攻击和防御过程。仿真结果表明,与 QLearning 方案和随机方案相比,我们提出的风险感知方案分别提高了 17.5% 和 142.4% 的防御效用,降低了 42.7% 和 59.6% 的系统风险。
{"title":"Risk-Aware SDN Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning","authors":"Dongying Gao,&nbsp;Caiwei Guo,&nbsp;Yi Zhang,&nbsp;Wen Ji,&nbsp;Zhilei Lv,&nbsp;Zheng Li,&nbsp;Kunsan Zhang,&nbsp;Ruibin Lin","doi":"10.1002/nem.2297","DOIUrl":"10.1002/nem.2297","url":null,"abstract":"<div>\u0000 \u0000 <p>The development of multiple attack methods by external attackers in recent years poses a huge challenge to the security and efficient operation of software-defined networks (SDN), which are the core of operational controllers and data storage. Therefore, it is critical to ensure that the normal process of network interaction between SDN servers and users is protected from external attacks. In this paper, we propose a risk-aware SDN defense framework based on safe reinforcement learning (SRL) to counter multiple attack actions. Specifically, the defender uses SRL to maximize the utility by choosing to provide a honeypot service or pseudo-honeypot service within predefined security constraints, while the external attacker maximizes the utility by choosing an anti-honeypot attack or masquerade attack. To describe the system risk in detail, we introduce the risk level function to model the simultaneous dynamic attack and defense processes. Simulation results demonstrate that our proposed risk-aware scheme improves the defense utility by 17.5% and 142.4% and reduces the system risk by 42.7% and 59.6% compared to the QLearning scheme and the Random scheme, respectively.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142247756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 “Advancing Blockchain and Cryptocurrency” IEEE ICBC 2023 年度最佳论文《推进区块链和加密货币》IJNM 特刊编辑部文章
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-04 DOI: 10.1002/nem.2301
Laura Ricci, Moayad Aloqaily, Vinayaka Pandit

This special issue contains extended versions of the best papers from 2023 IEEE International Conference on Blockchain and Cryptocurrency. The conference was held from May 1 to May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in illicit activity tracking, transaction mechanisms, synchronization, and database integration. The following papers highlight critical advancements and address complex challenges in these domains.

The first paper, “The next phase of identifying illicit activity in Bitcoin” by Jack Nicholls and his team, deepens the discourse on securing Bitcoin transactions. By analyzing current methods and proposing enhancements through machine learning, this paper provides crucial insights into improving the detection of illicit activities and enhancing network security.

In the second paper, “Transaction fee mechanisms with farsighted miners,” authored by Jens Leth Hougaard and colleagues, strategic miner behaviors in the Ethereum network are explored under the new fee mechanism, EIP1559. The paper extends the discussion to strategic foresight in mining operations, presenting a model that evaluates the impacts of varying degrees of hashing power and foresight on network throughput and block variability.

The third contribution, “Out-of-band transaction pool sync for large dynamic blockchain networks” by Novak Boskov et al., innovates the synchronization of transaction pools across large and dynamic blockchain networks. Employing the novel SREP algorithm, this study provides a comprehensive approach with proven scalability and performance improvements, particularly emphasizing reduced block propagation delays and bandwidth overhead.

The fourth paper, “DELTA: A Modular, Transparent and Efficient Synchronization of DLTs and Databases” by Fernández-Bravo Peñuela et al., addresses the integration of blockchain data into traditional databases. The DELTA system offers a seamless, efficient solution for querying blockchain data within enterprise systems, proving significantly faster and more reliable than existing methods.

These papers collectively enhance our understanding of blockchain technology's application, offering new methodologies, insights into miner behavior, security enhancements, and integration techniques for enterprise systems. Their contributions are instrumental in paving the way for more robust, efficient, and secure blockchain networks.

We are immensely grateful to the authors for their innovative research, the reviewers for their critical insights, and the editorial team for their commitment to compiling this transformative special issue.

本特刊收录了 2023 年 IEEE 区块链和加密货币国际会议的优秀论文扩展版。会议于 2023 年 5 月 1 日至 5 月 5 日在阿联酋迪拜举行。本特刊中的论文探讨了非法活动追踪、交易机制、同步和数据库集成方面的重要进展。杰克-尼克尔斯(Jack Nicholls)和他的团队撰写的第一篇论文《比特币非法活动识别的下一阶段》深化了关于比特币交易安全的讨论。在第二篇论文 "有远见矿工的交易费机制"(Transaction fee mechanisms with farsighted miners)中,Jens Leth Hougaard 及其同事探讨了在新的收费机制 EIP1559 下以太坊网络中的战略性矿工行为。Novak Boskov 等人撰写的第三篇论文《大型动态区块链网络的带外交易池同步》对大型动态区块链网络的交易池同步进行了创新。第四篇论文是 Fernández-Bravo Peñuela 等人撰写的 "DELTA:模块化、透明和高效的 DLT 与数据库同步",该论文探讨了将区块链数据整合到传统数据库中的问题。DELTA 系统为在企业系统中查询区块链数据提供了一个无缝、高效的解决方案,证明比现有方法更快、更可靠。这些论文共同提高了我们对区块链技术应用的理解,提供了新的方法、对矿工行为的洞察、安全性增强以及企业系统的集成技术。我们非常感谢作者们的创新研究,感谢审稿人的重要见解,感谢编辑团队致力于编纂这本具有变革意义的特刊。
{"title":"Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 “Advancing Blockchain and Cryptocurrency”","authors":"Laura Ricci,&nbsp;Moayad Aloqaily,&nbsp;Vinayaka Pandit","doi":"10.1002/nem.2301","DOIUrl":"10.1002/nem.2301","url":null,"abstract":"<p>This special issue contains extended versions of the best papers from 2023 IEEE International Conference on Blockchain and Cryptocurrency. The conference was held from May 1 to May 5, 2023, in Dubai, UAE. The papers in this special issue explore crucial advancements in illicit activity tracking, transaction mechanisms, synchronization, and database integration. The following papers highlight critical advancements and address complex challenges in these domains.</p><p>The first paper, “The next phase of identifying illicit activity in Bitcoin” by Jack Nicholls and his team, deepens the discourse on securing Bitcoin transactions. By analyzing current methods and proposing enhancements through machine learning, this paper provides crucial insights into improving the detection of illicit activities and enhancing network security.</p><p>In the second paper, “Transaction fee mechanisms with farsighted miners,” authored by Jens Leth Hougaard and colleagues, strategic miner behaviors in the Ethereum network are explored under the new fee mechanism, EIP1559. The paper extends the discussion to strategic foresight in mining operations, presenting a model that evaluates the impacts of varying degrees of hashing power and foresight on network throughput and block variability.</p><p>The third contribution, “Out-of-band transaction pool sync for large dynamic blockchain networks” by Novak Boskov et al., innovates the synchronization of transaction pools across large and dynamic blockchain networks. Employing the novel SREP algorithm, this study provides a comprehensive approach with proven scalability and performance improvements, particularly emphasizing reduced block propagation delays and bandwidth overhead.</p><p>The fourth paper, “DELTA: A Modular, Transparent and Efficient Synchronization of DLTs and Databases” by Fernández-Bravo Peñuela et al., addresses the integration of blockchain data into traditional databases. The DELTA system offers a seamless, efficient solution for querying blockchain data within enterprise systems, proving significantly faster and more reliable than existing methods.</p><p>These papers collectively enhance our understanding of blockchain technology's application, offering new methodologies, insights into miner behavior, security enhancements, and integration techniques for enterprise systems. Their contributions are instrumental in paving the way for more robust, efficient, and secure blockchain networks.</p><p>We are immensely grateful to the authors for their innovative research, the reviewers for their critical insights, and the editorial team for their commitment to compiling this transformative special issue.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2301","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Duo-H: An Effectual Consensus Algorithm Using Two-Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection Duo-H:利用双层碎片联盟区块链机制加强隐私保护的有效共识算法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1002/nem.2300
C. H. Sarada Devi, R. Anand, R. Hemalatha, B. Uma Maheswari

Blockchain is an innovative technology for storing data in decentralized, distributed, and secure chain blocks. Consortium blockchains are commonly used in transactions where transactions between organizations are also achieved by the blockchain. In the classic consortium blockchain system, entire nodes are added to each other in the process of transaction consensus. This leads to lower confidentiality in protecting transaction data within the organizations in the consortium. The throughput of the existing consortium blockchain system is still low. To solve the above problems, the paper proposes a two-tier consortium blockchain with transaction privacy based on sharding technology. First, a trust value assessment is carried out to select the nodes of the blockchain. The duo-head observation strategy uses these trust values to identify the nonmalicious node. Finally, the consensus separation approach based on the guarantee mechanism strategy with the shard nodes is presented. This approach is used to select reliable nodes for the blocks to be stored. The proposed consortium blockchain approach evaluation is done in terms of latency, throughput, and transactions per second metrics. As a result of the evaluations, the proposed model with 32 shards possesses 143,891 tx/s$$ tx/s $$ of throughput and 1.11 s of latency. Moreover, by the proposed two-tier consortium model, time consumption is also decreased when uploading data. For a data set of 50,000, the suggested model has a time consumption of 96 s. The proposed research results in higher throughput and less latency in transactions. Also, the research enhances the scalability and reliability by overcoming the poor node issues.

区块链是一种创新技术,用于将数据存储在去中心化、分布式和安全的链块中。联盟区块链通常用于交易,组织之间的交易也通过区块链实现。在经典的联盟区块链系统中,整个节点在交易共识过程中相互添加。这导致保护联盟内各组织交易数据的保密性较低。现有联盟区块链系统的吞吐量仍然较低。为解决上述问题,本文提出了一种基于分片技术的具有交易保密性的双层联盟区块链。首先,通过信任值评估来选择区块链的节点。双头观察策略利用这些信任值来识别非恶意节点。最后,介绍了基于分片节点担保机制策略的共识分离方法。这种方法用于为要存储的区块选择可靠的节点。提议的联盟区块链方法从延迟、吞吐量和每秒交易量等指标进行了评估。评估结果显示,32 个分片的拟议模型拥有 143 891 的吞吐量和 1.11 秒的延迟。此外,通过提议的两层联盟模式,上传数据的时间消耗也减少了。对于 50,000 个数据集,建议的模型耗时 96 秒。此外,这项研究还克服了节点不佳的问题,提高了可扩展性和可靠性。
{"title":"Duo-H: An Effectual Consensus Algorithm Using Two-Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection","authors":"C. H. Sarada Devi,&nbsp;R. Anand,&nbsp;R. Hemalatha,&nbsp;B. Uma Maheswari","doi":"10.1002/nem.2300","DOIUrl":"10.1002/nem.2300","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain is an innovative technology for storing data in decentralized, distributed, and secure chain blocks. Consortium blockchains are commonly used in transactions where transactions between organizations are also achieved by the blockchain. In the classic consortium blockchain system, entire nodes are added to each other in the process of transaction consensus. This leads to lower confidentiality in protecting transaction data within the organizations in the consortium. The throughput of the existing consortium blockchain system is still low. To solve the above problems, the paper proposes a two-tier consortium blockchain with transaction privacy based on sharding technology. First, a trust value assessment is carried out to select the nodes of the blockchain. The duo-head observation strategy uses these trust values to identify the nonmalicious node. Finally, the consensus separation approach based on the guarantee mechanism strategy with the shard nodes is presented. This approach is used to select reliable nodes for the blocks to be stored. The proposed consortium blockchain approach evaluation is done in terms of latency, throughput, and transactions per second metrics. As a result of the evaluations, the proposed model with 32 shards possesses 143,891 \u0000<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>tx</mi>\u0000 <mo>/</mo>\u0000 <mi>s</mi>\u0000 </mrow>\u0000 <annotation>$$ tx/s $$</annotation>\u0000 </semantics></math> of throughput and 1.11 s of latency. Moreover, by the proposed two-tier consortium model, time consumption is also decreased when uploading data. For a data set of 50,000, the suggested model has a time consumption of 96 s. The proposed research results in higher throughput and less latency in transactions. Also, the research enhances the scalability and reliability by overcoming the poor node issues.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing 移动边缘计算上的区块链和数字双胞胎智能化、可信任的农业系统
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1002/nem.2299
Geetanjali Rathee, Hemraj Saini, Selvaraj Praveen Chakkravarthy, Rajagopal Maheswar
Advancement and flourishment in mobile edge computing (MEC) have motivated the farmers to deploy an efficient ecosystem in their farms. For further real‐time monitoring and surveillance of the environment along with the deployment of intelligent farming, digital twin is considered as one of the emerging and most promising technologies. For proper optimization and utilization of physical systems, the physical components of the ecosystems are connected with the digital space. Further, the smart technologies and devices have convinced to address the expected level of requirements for accessing the rapid growth in farming associated with digital twins. However, with a large number of smart devices, huge amount of generated information from heterogeneous devices may increase the privacy and security concern by challenging the interrupting operations and management of services in smart farming. In addition, the growing risks associated with MEC by modifying the sensor readings and quality of service further affect the overall growth of intelligent farming. In order to resolve these challenges, this paper has proposed a secure surveillance architecture to detect deviations by incorporating digital twins in the ecosystem. Further, for real‐time monitoring and preprocessing of information, we have integrated a four‐dimensional trust mechanism along with blockchain. The four‐dimensional trusted method recognizes the behavior of each communicating device during the transmission of information in the network. Further, blockchain strengthens the surveillance process of each device behavior by continuously monitoring their activities. The proposed mechanism is tested and verified against various abnormalities received from sensors by simulating false use cases in the ecosystem and compared against various security metrics over existing approaches. Furthermore, the proposed mechanism is validated against several security threats such as control command threat, coordinated cyber threats, accuracy, and decision‐making and prediction of records over existing methods.
移动边缘计算(MEC)的进步和蓬勃发展促使农民在农场中部署高效的生态系统。为了进一步对环境进行实时监测和监控,同时部署智能农业,数字孪生被认为是最有前途的新兴技术之一。为了适当优化和利用物理系统,生态系统的物理组件与数字空间相连接。此外,智能技术和设备已确信能够满足与数字孪生相关的农业快速增长的预期要求。然而,随着智能设备的大量出现,来自异构设备的海量信息可能会增加隐私和安全问题,对智能农业服务的中断操作和管理构成挑战。此外,通过修改传感器读数和服务质量而与 MEC 相关的风险不断增加,进一步影响了智能农业的整体发展。为了解决这些挑战,本文提出了一种安全监控架构,通过将数字双胞胎纳入生态系统来检测偏差。此外,为了实现实时监控和信息预处理,我们将四维信任机制与区块链结合在一起。四维信任方法可识别网络信息传输过程中每个通信设备的行为。此外,区块链通过持续监控每个设备的活动,加强了对其行为的监控过程。通过模拟生态系统中的虚假用例,针对从传感器接收到的各种异常情况对所提出的机制进行了测试和验证,并与现有方法的各种安全指标进行了比较。此外,与现有方法相比,还针对控制指令威胁、协同网络威胁、准确性、决策和记录预测等几种安全威胁对所提出的机制进行了验证。
{"title":"An Intelligent and Trust‐Enabled Farming Systems With Blockchain and Digital Twins on Mobile Edge Computing","authors":"Geetanjali Rathee, Hemraj Saini, Selvaraj Praveen Chakkravarthy, Rajagopal Maheswar","doi":"10.1002/nem.2299","DOIUrl":"https://doi.org/10.1002/nem.2299","url":null,"abstract":"Advancement and flourishment in mobile edge computing (MEC) have motivated the farmers to deploy an efficient ecosystem in their farms. For further real‐time monitoring and surveillance of the environment along with the deployment of intelligent farming, digital twin is considered as one of the emerging and most promising technologies. For proper optimization and utilization of physical systems, the physical components of the ecosystems are connected with the digital space. Further, the smart technologies and devices have convinced to address the expected level of requirements for accessing the rapid growth in farming associated with digital twins. However, with a large number of smart devices, huge amount of generated information from heterogeneous devices may increase the privacy and security concern by challenging the interrupting operations and management of services in smart farming. In addition, the growing risks associated with MEC by modifying the sensor readings and quality of service further affect the overall growth of intelligent farming. In order to resolve these challenges, this paper has proposed a secure surveillance architecture to detect deviations by incorporating digital twins in the ecosystem. Further, for real‐time monitoring and preprocessing of information, we have integrated a four‐dimensional trust mechanism along with blockchain. The four‐dimensional trusted method recognizes the behavior of each communicating device during the transmission of information in the network. Further, blockchain strengthens the surveillance process of each device behavior by continuously monitoring their activities. The proposed mechanism is tested and verified against various abnormalities received from sensors by simulating false use cases in the ecosystem and compared against various security metrics over existing approaches. Furthermore, the proposed mechanism is validated against several security threats such as control command threat, coordinated cyber threats, accuracy, and decision‐making and prediction of records over existing methods.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"16 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing ProKube:用于异构边缘计算推理的主动式 Kubernetes 协调器
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-18 DOI: 10.1002/nem.2298
Babar Ali, Muhammed Golec, Sukhpal Singh Gill, Felix Cuadrado, Steve Uhlig
Deep neural network (DNN) and machine learning (ML) models/ inferences produce highly accurate results demanding enormous computational resources. The limited capacity of end‐user smart gadgets drives companies to exploit computational resources in an edge‐to‐cloud continuum and host applications at user‐facing locations with users requiring fast responses. Kubernetes hosted inferences with poor resource request estimation results in service level agreement (SLA) violation in terms of latency and below par performance with higher end‐to‐end (E2E) delays. Lifetime static resource provisioning either hurts user experience for under‐resource provisioning or incurs cost with over‐provisioning. Dynamic scaling offers to remedy delay by upscaling leading to additional cost whereas a simple migration to another location offering latency in SLA bounds can reduce delay and minimize cost. To address this cost and delay challenges for ML inferences in the inherent heterogeneous, resource‐constrained, and distributed edge environment, we propose ProKube, which is a proactive container scaling and migration orchestrator to dynamically adjust the resources and container locations with a fair balance between cost and delay. ProKube is developed in conjunction with Google Kubernetes Engine (GKE) enabling cross‐cluster migration and/ or dynamic scaling. It further supports the regular addition of freshly collected logs into scheduling decisions to handle unpredictable network behavior. Experiments conducted in heterogeneous edge settings show the efficacy of ProKube to its counterparts cost greedy (CG), latency greedy (LG), and GeKube (GK). ProKube offers 68%, 7%, and 64% SLA violation reduction to CG, LG, and GK, respectively, and it improves cost by 4.77 cores to LG and offers more cost of 3.94 to CG and GK.
深度神经网络(DNN)和机器学习(ML)模型/推断会产生高度精确的结果,需要大量的计算资源。终端用户智能小工具的容量有限,这促使公司在从边缘到云的连续过程中开发计算资源,并在面向用户的位置托管应用程序,以满足用户对快速响应的要求。Kubernetes 托管推论的资源请求估算能力较差,导致服务水平协议(SLA)遭到违反,表现为延迟和低于标准的性能,端到端(E2E)延迟较高。终身静态资源配置要么会因资源配置不足而损害用户体验,要么会因资源配置过多而产生成本。动态扩展可通过上调规模来弥补延迟,但这会导致额外的成本,而简单地迁移到另一个位置,在服务水平协议(SLA)范围内提供延迟,则可减少延迟并最大限度地降低成本。为了解决在固有的异构、资源受限和分布式边缘环境中进行 ML 推断所面临的成本和延迟挑战,我们提出了 ProKube,它是一种主动式容器扩展和迁移协调器,可动态调整资源和容器位置,在成本和延迟之间取得合理平衡。ProKube 是与谷歌 Kubernetes 引擎(GKE)联合开发的,可实现跨集群迁移和/或动态扩展。它还支持在调度决策中定期添加最新收集的日志,以处理不可预测的网络行为。在异构边缘设置中进行的实验表明,ProKube 的功效优于其同类产品成本贪婪(CG)、延迟贪婪(LG)和 GeKube(GK)。ProKube 比 CG、LG 和 GK 分别减少了 68%、7% 和 64% 的 SLA 违反率,比 LG 提高了 4.77 个内核的成本,比 CG 和 GK 提高了 3.94 个内核的成本。
{"title":"ProKube: Proactive Kubernetes Orchestrator for Inference in Heterogeneous Edge Computing","authors":"Babar Ali, Muhammed Golec, Sukhpal Singh Gill, Felix Cuadrado, Steve Uhlig","doi":"10.1002/nem.2298","DOIUrl":"https://doi.org/10.1002/nem.2298","url":null,"abstract":"Deep neural network (DNN) and machine learning (ML) models/ inferences produce highly accurate results demanding enormous computational resources. The limited capacity of end‐user smart gadgets drives companies to exploit computational resources in an edge‐to‐cloud continuum and host applications at user‐facing locations with users requiring fast responses. Kubernetes hosted inferences with poor resource request estimation results in service level agreement (SLA) violation in terms of latency and below par performance with higher end‐to‐end (E2E) delays. Lifetime static resource provisioning either hurts user experience for under‐resource provisioning or incurs cost with over‐provisioning. Dynamic scaling offers to remedy delay by upscaling leading to additional cost whereas a simple migration to another location offering latency in SLA bounds can reduce delay and minimize cost. To address this cost and delay challenges for ML inferences in the inherent heterogeneous, resource‐constrained, and distributed edge environment, we propose ProKube, which is a proactive container scaling and migration orchestrator to dynamically adjust the resources and container locations with a fair balance between cost and delay. ProKube is developed in conjunction with Google Kubernetes Engine (GKE) enabling cross‐cluster migration and/ or dynamic scaling. It further supports the regular addition of freshly collected logs into scheduling decisions to handle unpredictable network behavior. Experiments conducted in heterogeneous edge settings show the efficacy of ProKube to its counterparts cost greedy (CG), latency greedy (LG), and GeKube (GK). ProKube offers 68%, 7%, and 64% SLA violation reduction to CG, LG, and GK, respectively, and it improves cost by 4.77 cores to LG and offers more cost of 3.94 to CG and GK.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"3 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network 基于 Salp Swarm 和人工神经网络的物联网入侵检测方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-18 DOI: 10.1002/nem.2296
Omar A. Alzubi, Jafar A. Alzubi, Issa Qiqieh, Ala' M. Al‐Zoubi
The Internet of Things has emerged as a significant and influential technology in modern times. IoT presents solutions to reduce the need for human intervention and emphasizes task automation. According to a Cisco report, there were over 14.7 billion IoT devices in 2023. However, as the number of devices and users utilizing this technology grows, so does the potential for security breaches and intrusions. For instance, insecure IoT devices, such as smart home appliances or industrial sensors, can be vulnerable to hacking attempts. Hackers might exploit these vulnerabilities to gain unauthorized access to sensitive data or even control the devices remotely. To address and prevent this issue, this work proposes integrating intrusion detection systems (IDSs) with an artificial neural network (ANN) and a salp swarm algorithm (SSA) to enhance intrusion detection in an IoT environment. The SSA functions as an optimization algorithm that selects optimal networks for the multilayer perceptron (MLP). The proposed approach has been evaluated using three novel benchmarks: Edge‐IIoTset, WUSTL‐IIOT‐2021, and IoTID20. Additionally, various experiments have been conducted to assess the effectiveness of the proposed approach. Additionally, a comparison is made between the proposed approach and several approaches from the literature, particularly SVM combined with various metaheuristic algorithms. Then, identify the most crucial features for each dataset to improve detection performance. The SSA‐MLP outperforms the other algorithms with 88.241%, 93.610%, and 97.698% for Edge‐IIoTset, IoTID20, and WUSTL, respectively.
物联网已成为当代一项重要而有影响力的技术。物联网提出了减少人工干预需求的解决方案,并强调任务自动化。根据思科的一份报告,到 2023 年,物联网设备将超过 147 亿台。然而,随着使用这项技术的设备和用户数量的增加,安全漏洞和入侵的可能性也在增加。例如,智能家电或工业传感器等不安全的物联网设备很容易受到黑客攻击。黑客可能会利用这些漏洞未经授权访问敏感数据,甚至远程控制设备。为解决和防止这一问题,本研究提出将入侵检测系统(IDS)与人工神经网络(ANN)和沙蜂算法(SSA)相结合,以加强物联网环境中的入侵检测。SSA 作为一种优化算法,可为多层感知器(MLP)选择最佳网络。已使用三种新基准对所提出的方法进行了评估:Edge-IIoTset、WUSTL-IIOT-2021 和 IoTID20。此外,还进行了各种实验来评估所提出方法的有效性。此外,还对提出的方法和文献中的几种方法进行了比较,特别是 SVM 与各种元启发式算法的结合。然后,确定每个数据集最关键的特征,以提高检测性能。在 Edge-IIoTset、IoTID20 和 WUSTL 数据集上,SSA-MLP 的检测率分别为 88.241%、93.610% 和 97.698%,优于其他算法。
{"title":"An IoT Intrusion Detection Approach Based on Salp Swarm and Artificial Neural Network","authors":"Omar A. Alzubi, Jafar A. Alzubi, Issa Qiqieh, Ala' M. Al‐Zoubi","doi":"10.1002/nem.2296","DOIUrl":"https://doi.org/10.1002/nem.2296","url":null,"abstract":"The Internet of Things has emerged as a significant and influential technology in modern times. IoT presents solutions to reduce the need for human intervention and emphasizes task automation. According to a Cisco report, there were over 14.7 billion IoT devices in 2023. However, as the number of devices and users utilizing this technology grows, so does the potential for security breaches and intrusions. For instance, insecure IoT devices, such as smart home appliances or industrial sensors, can be vulnerable to hacking attempts. Hackers might exploit these vulnerabilities to gain unauthorized access to sensitive data or even control the devices remotely. To address and prevent this issue, this work proposes integrating intrusion detection systems (IDSs) with an artificial neural network (ANN) and a salp swarm algorithm (SSA) to enhance intrusion detection in an IoT environment. The SSA functions as an optimization algorithm that selects optimal networks for the multilayer perceptron (MLP). The proposed approach has been evaluated using three novel benchmarks: Edge‐IIoTset, WUSTL‐IIOT‐2021, and IoTID20. Additionally, various experiments have been conducted to assess the effectiveness of the proposed approach. Additionally, a comparison is made between the proposed approach and several approaches from the literature, particularly SVM combined with various metaheuristic algorithms. Then, identify the most crucial features for each dataset to improve detection performance. The SSA‐MLP outperforms the other algorithms with 88.241%, 93.610%, and 97.698% for Edge‐IIoTset, IoTID20, and WUSTL, respectively.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"9 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture–Fully Convolutional Variational Autoencoder Model 使用高斯混杂-完全卷积变异自动编码器模型对基于区块链的物联网进行入侵检测
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-18 DOI: 10.1002/nem.2295
C. U. Om Kumar, Suguna Marappan, Bhavadharini Murugeshan, P. Mercy Rajaselvi Beaulah

The Internet of Things (IoT) is an evolving paradigm that has dramatically transformed the traditional style of living into a smart lifestyle. IoT devices have recently attained great attention due to their wide range of applications in various sectors, such as healthcare, smart home devices, smart industries, smart cities, and so forth. However, security is still a challenging issue in the IoT environment. Because of the disparate nature of IoT devices, it is hard to detect the different kinds of attacks available in IoT. Various existing works aim to provide a reliable intrusion detection system (IDS) technique. But they failed to work because of several security issues. Thus, the proposed study presents a blockchain-based deep learning model for IDS. Initially, the input data are preprocessed using min-max normalization, converting the raw input data into improved quality. In order to detect the presented attacks in the provided dataset, the proposed work introduced Gaussian mixture–fully convolutional variational autoencoder (GM-FCVAE) model. The implementation is performed in Python, and the performance of the proposed GM-FCVAE model is analyzed by evaluating several metrics. The proposed GM-FCVAE model is tested on three datasets and attained superior accuracy of 99.18%, 98.81%, and 98.4% with UNSW-NB15, CICIDS 2019, and N_BaIoT datasets, respectively. The comparison reveals that the proposed GM-FCVAE model obtained higher results than the other deep learning techniques. The outperformance shows the efficacy of the proposed study in identifying security attacks.

物联网(IoT)是一种不断发展的模式,它极大地改变了传统的生活方式,使之成为一种智能生活方式。最近,物联网设备因其在医疗保健、智能家居设备、智能工业、智能城市等各个领域的广泛应用而备受关注。然而,在物联网环境中,安全仍然是一个具有挑战性的问题。由于物联网设备各不相同,因此很难检测到物联网中存在的各种攻击。现有的各种研究旨在提供可靠的入侵检测系统(IDS)技术。但是,由于存在一些安全问题,它们未能奏效。因此,本研究提出了一种基于区块链的 IDS 深度学习模型。首先,使用最小-最大归一化对输入数据进行预处理,将原始输入数据转换为更高质量的数据。为了检测所提供数据集中的攻击,该研究引入了高斯混合-完全卷积变异自动编码器(GM-FCVAE)模型。该模型用 Python 实现,并通过评估多个指标分析了所提出的 GM-FCVAE 模型的性能。所提出的 GM-FCVAE 模型在三个数据集上进行了测试,在 UNSW-NB15、CICIDS 2019 和 N_BaIoT 数据集上的准确率分别达到了 99.18%、98.81% 和 98.4%。对比结果表明,所提出的 GM-FCVAE 模型比其他深度学习技术获得了更高的结果。优异的表现表明,所提出的研究在识别安全攻击方面卓有成效。
{"title":"Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture–Fully Convolutional Variational Autoencoder Model","authors":"C. U. Om Kumar,&nbsp;Suguna Marappan,&nbsp;Bhavadharini Murugeshan,&nbsp;P. Mercy Rajaselvi Beaulah","doi":"10.1002/nem.2295","DOIUrl":"10.1002/nem.2295","url":null,"abstract":"<div>\u0000 \u0000 <p>The Internet of Things (IoT) is an evolving paradigm that has dramatically transformed the traditional style of living into a smart lifestyle. IoT devices have recently attained great attention due to their wide range of applications in various sectors, such as healthcare, smart home devices, smart industries, smart cities, and so forth. However, security is still a challenging issue in the IoT environment. Because of the disparate nature of IoT devices, it is hard to detect the different kinds of attacks available in IoT. Various existing works aim to provide a reliable intrusion detection system (IDS) technique. But they failed to work because of several security issues. Thus, the proposed study presents a blockchain-based deep learning model for IDS. Initially, the input data are preprocessed using min-max normalization, converting the raw input data into improved quality. In order to detect the presented attacks in the provided dataset, the proposed work introduced Gaussian mixture–fully convolutional variational autoencoder (GM-FCVAE) model. The implementation is performed in Python, and the performance of the proposed GM-FCVAE model is analyzed by evaluating several metrics. The proposed GM-FCVAE model is tested on three datasets and attained superior accuracy of 99.18%, 98.81%, and 98.4% with UNSW-NB15, CICIDS 2019, and N_BaIoT datasets, respectively. The comparison reveals that the proposed GM-FCVAE model obtained higher results than the other deep learning techniques. The outperformance shows the efficacy of the proposed study in identifying security attacks.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142177414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1