首页 > 最新文献

Future Internet最新文献

英文 中文
SUDC: Synchronous Update with the Division and Combination of SRv6 Policy SUDC:同步更新与 SRv6 政策的划分与组合
IF 3.4 Q1 Computer Science Pub Date : 2024-04-22 DOI: 10.3390/fi16040140
Yuze Liu, Weihong Wu, Ying Wang, Jiang Liu, Fan Yang
With the expansion of network scale, new network services are emerging. Segment Routing over IPv6 (SRv6) can meet the diverse needs of more new services due to its excellent scalability and programmability. In the intelligent 6-Generation (6G) scenario, frequent SRv6 Traffic Engineering (TE) policy updates will result in the serious problem of unsynchronized updates across routers. Existing solutions suffer from issues such as long update cycles or large data overhead. To optimize the policy-update process, this paper proposes a scheme called Synchronous Update with the Division and Combination of SRv6 Policy (SUDC). Based on the characteristics of the SRv6 TE policy, SUDC divides the policies and introduces Bit Index Explicit Replication IPv6 Encapsulation (BIERv6) to multicast the policy blocks derived from policy dividing. The contribution of this paper is to propose the policy-dividing and combination mechanism and the policy-dividing algorithm. The simulation results demonstrate that compared with the existing schemes, the update overhead and update cycle of SUDC are reduced by 46.71% and 46.6%, respectively. The problem of unsynchronized updates across routers has been further improved.
随着网络规模的扩大,新的网络服务不断涌现。IPv6 网段路由(SRv6)凭借其出色的可扩展性和可编程性,可以满足更多新业务的不同需求。在智能 6 代(6G)场景中,频繁的 SRv6 流量工程(TE)策略更新将导致路由器间更新不同步的严重问题。现有解决方案存在更新周期长或数据开销大等问题。为了优化策略更新流程,本文提出了一种名为 "SRv6 策略分合同步更新(SUDC)"的方案。根据 SRv6 TE 策略的特点,SUDC 对策略进行了划分,并引入比特索引显式复制 IPv6 封装(BIERv6)来组播划分策略后得到的策略块。本文的贡献在于提出了策略划分和组合机制以及策略划分算法。仿真结果表明,与现有方案相比,SUDC 的更新开销和更新周期分别减少了 46.71% 和 46.6%。跨路由器不同步更新的问题也得到了进一步改善。
{"title":"SUDC: Synchronous Update with the Division and Combination of SRv6 Policy","authors":"Yuze Liu, Weihong Wu, Ying Wang, Jiang Liu, Fan Yang","doi":"10.3390/fi16040140","DOIUrl":"https://doi.org/10.3390/fi16040140","url":null,"abstract":"With the expansion of network scale, new network services are emerging. Segment Routing over IPv6 (SRv6) can meet the diverse needs of more new services due to its excellent scalability and programmability. In the intelligent 6-Generation (6G) scenario, frequent SRv6 Traffic Engineering (TE) policy updates will result in the serious problem of unsynchronized updates across routers. Existing solutions suffer from issues such as long update cycles or large data overhead. To optimize the policy-update process, this paper proposes a scheme called Synchronous Update with the Division and Combination of SRv6 Policy (SUDC). Based on the characteristics of the SRv6 TE policy, SUDC divides the policies and introduces Bit Index Explicit Replication IPv6 Encapsulation (BIERv6) to multicast the policy blocks derived from policy dividing. The contribution of this paper is to propose the policy-dividing and combination mechanism and the policy-dividing algorithm. The simulation results demonstrate that compared with the existing schemes, the update overhead and update cycle of SUDC are reduced by 46.71% and 46.6%, respectively. The problem of unsynchronized updates across routers has been further improved.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140673858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN 基于 SDN 的多约束和多策略路径跳转主动防御方法
IF 3.4 Q1 Computer Science Pub Date : 2024-04-22 DOI: 10.3390/fi16040143
Bing Zhang, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu, Huan Wang
Path hopping serves as an active defense mechanism in network security, yet it encounters challenges like a restricted path switching space, the recurrent use of similar paths and vital nodes, a singular triggering mechanism for path switching, and fixed hopping intervals. This paper introduces an active defense method employing multiple constraints and strategies for path hopping. A depth-first search (DFS) traversal is utilized to compute all possible paths between nodes, thereby broadening the path switching space while simplifying path generation complexity. Subsequently, constraints are imposed on residual bandwidth, selection periods, path similitude, and critical nodes to reduce the likelihood of reusing similar paths and crucial nodes. Moreover, two path switching strategies are formulated based on the weights of residual bandwidth and critical nodes, along with the calculation of path switching periods. This facilitates adaptive switching of path hopping paths and intervals, contingent on the network’s residual bandwidth threshold, in response to diverse attack scenarios. Simulation outcomes illustrate that this method, while maintaining normal communication performance, expands the path switching space effectively, safeguards against eavesdropping and link-flooding attacks, enhances path switching diversity and unpredictability, and fortifies the network’s resilience against malicious attacks.
路径跳转是网络安全中的一种主动防御机制,但它面临着路径切换空间受限、重复使用相似路径和重要节点、路径切换触发机制单一以及跳转间隔固定等挑战。本文介绍了一种主动防御方法,该方法采用多重约束和路径跳转策略。利用深度优先搜索(DFS)遍历来计算节点之间所有可能的路径,从而在简化路径生成复杂度的同时拓宽了路径切换空间。随后,对剩余带宽、选择周期、路径相似度和关键节点施加约束,以降低重复使用相似路径和关键节点的可能性。此外,根据剩余带宽和关键节点的权重以及路径切换周期的计算,制定了两种路径切换策略。这有助于根据网络的剩余带宽阈值自适应切换跳转路径和间隔,以应对不同的攻击场景。仿真结果表明,这种方法在保持正常通信性能的同时,有效扩展了路径切换空间,防止了窃听和链路淹没攻击,提高了路径切换的多样性和不可预测性,增强了网络抵御恶意攻击的能力。
{"title":"Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN","authors":"Bing Zhang, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu, Huan Wang","doi":"10.3390/fi16040143","DOIUrl":"https://doi.org/10.3390/fi16040143","url":null,"abstract":"Path hopping serves as an active defense mechanism in network security, yet it encounters challenges like a restricted path switching space, the recurrent use of similar paths and vital nodes, a singular triggering mechanism for path switching, and fixed hopping intervals. This paper introduces an active defense method employing multiple constraints and strategies for path hopping. A depth-first search (DFS) traversal is utilized to compute all possible paths between nodes, thereby broadening the path switching space while simplifying path generation complexity. Subsequently, constraints are imposed on residual bandwidth, selection periods, path similitude, and critical nodes to reduce the likelihood of reusing similar paths and crucial nodes. Moreover, two path switching strategies are formulated based on the weights of residual bandwidth and critical nodes, along with the calculation of path switching periods. This facilitates adaptive switching of path hopping paths and intervals, contingent on the network’s residual bandwidth threshold, in response to diverse attack scenarios. Simulation outcomes illustrate that this method, while maintaining normal communication performance, expands the path switching space effectively, safeguards against eavesdropping and link-flooding attacks, enhances path switching diversity and unpredictability, and fortifies the network’s resilience against malicious attacks.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140674591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SRv6-Based Edge Service Continuity in 5G Mobile Networks 5G 移动网络中基于 SRv6 的边缘服务连续性
IF 3.4 Q1 Computer Science Pub Date : 2024-04-19 DOI: 10.3390/fi16040138
Laura Lemmi, C. Puliafito, A. Virdis, E. Mingozzi
Ensuring compliance with the stringent latency requirements of edge services requires close cooperation between the network and computing components. Within mobile 5G networks, the nomadic behavior of users may impact the performance of edge services, prompting the need for workload migration techniques. These techniques allow services to follow users by moving between edge nodes. This paper introduces an innovative approach for edge service continuity by integrating Segment Routing over IPv6 (SRv6) into the 5G core data plane alongside the ETSI multi-access edge computing (MEC) architecture. Our approach maintains compatibility with non-SRv6 5G network components. We use SRv6 for packet steering and Software-Defined Networking (SDN) for dynamic network configuration. Leveraging the SRv6 Network Programming paradigm, we achieve lossless workload migration by implementing a packet buffer as a virtual network function. Our buffer may be dynamically allocated and configured within the network. We test our proposed solution on a small-scale testbed consisting of an Open Network Operating System (ONOS) SDN controller and a core network made of P4 BMv2 switches, emulated using Mininet. A comparison with a non-SRv6 alternative that uses IPv6 routing shows the higher scalability and flexibility of our approach in terms of the number of rules to be installed and time required for configuration.
要确保边缘服务符合严格的延迟要求,就需要网络和计算组件之间密切合作。在移动 5G 网络中,用户的游牧行为可能会影响边缘服务的性能,因此需要工作负载迁移技术。这些技术允许服务通过在边缘节点之间移动来跟随用户。本文通过将 IPv6 分段路由(SRv6)集成到 5G 核心数据平面和 ETSI 多接入边缘计算(MEC)架构中,介绍了一种创新的边缘服务连续性方法。我们的方法保持了与非 SRv6 5G 网络组件的兼容性。我们使用 SRv6 进行数据包转向,使用软件定义网络(SDN)进行动态网络配置。利用 SRv6 网络编程范例,我们通过将数据包缓冲区作为虚拟网络功能来实现无损工作负载迁移。我们的缓冲区可在网络内动态分配和配置。我们在一个由开放网络操作系统(ONOS)SDN 控制器和使用 Mininet 仿真的 P4 BMv2 交换机组成的核心网络组成的小型测试平台上测试了我们提出的解决方案。与使用 IPv6 路由的非 SRv6 替代方案相比,我们的方法在安装规则数量和配置所需时间方面具有更高的可扩展性和灵活性。
{"title":"SRv6-Based Edge Service Continuity in 5G Mobile Networks","authors":"Laura Lemmi, C. Puliafito, A. Virdis, E. Mingozzi","doi":"10.3390/fi16040138","DOIUrl":"https://doi.org/10.3390/fi16040138","url":null,"abstract":"Ensuring compliance with the stringent latency requirements of edge services requires close cooperation between the network and computing components. Within mobile 5G networks, the nomadic behavior of users may impact the performance of edge services, prompting the need for workload migration techniques. These techniques allow services to follow users by moving between edge nodes. This paper introduces an innovative approach for edge service continuity by integrating Segment Routing over IPv6 (SRv6) into the 5G core data plane alongside the ETSI multi-access edge computing (MEC) architecture. Our approach maintains compatibility with non-SRv6 5G network components. We use SRv6 for packet steering and Software-Defined Networking (SDN) for dynamic network configuration. Leveraging the SRv6 Network Programming paradigm, we achieve lossless workload migration by implementing a packet buffer as a virtual network function. Our buffer may be dynamically allocated and configured within the network. We test our proposed solution on a small-scale testbed consisting of an Open Network Operating System (ONOS) SDN controller and a core network made of P4 BMv2 switches, emulated using Mininet. A comparison with a non-SRv6 alternative that uses IPv6 routing shows the higher scalability and flexibility of our approach in terms of the number of rules to be installed and time required for configuration.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140685739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks 从 "寻找并摧毁 "到 "分割并摧毁":连接分区是对抗低速率 DoS 攻击的有效工具
IF 3.4 Q1 Computer Science Pub Date : 2024-04-19 DOI: 10.3390/fi16040137
Vyron Kampourakis, Georgios Michail Makrakis, C. Kolias
Low-rate Denial of Service (LDoS) attacks are today considered one of the biggest threats against modern data centers and industrial infrastructures. Unlike traditional Distributed Denial of Service (DDoS) attacks that are mainly volumetric, LDoS attacks exhibit a very small network footprint, and therefore can easily elude standard detection and defense mechanisms. This work introduces a defense strategy that may prove particularly effective against attacks that are based on long-lived connections, an inherent trait of LDoS attacks. Our approach is based on iteratively partitioning the active connections of a victim server across a number of replica servers, and then re-evaluating the health status of each replica instance. At its core, this approach relies on live migration and containerization technologies. The main advantage of the proposed approach is that it can discover and isolate malicious connections with virtually no information about the type and characteristics of the performed attack. Additionally, while the defense takes place, there is little to no indication of the fact to the attacker. We assess various rudimentary schemes to quantify the scalability of our approach. The results from the simulations indicate that it is possible to save the vast majority of the benign connections (80%) in less than 5 min.
如今,低速率拒绝服务(LDoS)攻击被认为是现代数据中心和工业基础设施面临的最大威胁之一。传统的分布式拒绝服务(DDoS)攻击主要是体积攻击,而 LDoS 攻击则不同,它的网络足迹非常小,因此很容易躲过标准的检测和防御机制。本研究介绍了一种防御策略,该策略可能会被证明对基于长期连接的攻击特别有效,而长期连接正是 LDoS 攻击的固有特征。我们的方法基于在多个副本服务器之间迭代分割受害服务器的活动连接,然后重新评估每个副本实例的健康状况。这种方法的核心是实时迁移和容器化技术。所提方法的主要优势在于,它可以在几乎不了解所实施攻击的类型和特征的情况下发现并隔离恶意连接。此外,在防御过程中,攻击者几乎不会察觉到这一点。我们评估了各种初级方案,以量化我们方法的可扩展性。模拟结果表明,可以在 5 分钟内保存绝大多数良性连接(80%)。
{"title":"From Seek-and-Destroy to Split-and-Destroy: Connection Partitioning as an Effective Tool against Low-Rate DoS Attacks","authors":"Vyron Kampourakis, Georgios Michail Makrakis, C. Kolias","doi":"10.3390/fi16040137","DOIUrl":"https://doi.org/10.3390/fi16040137","url":null,"abstract":"Low-rate Denial of Service (LDoS) attacks are today considered one of the biggest threats against modern data centers and industrial infrastructures. Unlike traditional Distributed Denial of Service (DDoS) attacks that are mainly volumetric, LDoS attacks exhibit a very small network footprint, and therefore can easily elude standard detection and defense mechanisms. This work introduces a defense strategy that may prove particularly effective against attacks that are based on long-lived connections, an inherent trait of LDoS attacks. Our approach is based on iteratively partitioning the active connections of a victim server across a number of replica servers, and then re-evaluating the health status of each replica instance. At its core, this approach relies on live migration and containerization technologies. The main advantage of the proposed approach is that it can discover and isolate malicious connections with virtually no information about the type and characteristics of the performed attack. Additionally, while the defense takes place, there is little to no indication of the fact to the attacker. We assess various rudimentary schemes to quantify the scalability of our approach. The results from the simulations indicate that it is possible to save the vast majority of the benign connections (80%) in less than 5 min.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140684629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing 多接入边缘计算中基于分布式重叠网络缓存共享机制的计算卸载
IF 3.4 Q1 Computer Science Pub Date : 2024-04-19 DOI: 10.3390/fi16040136
Yazhi Liu, Pengfei Zhong, Zhigang Yang, Wei Li, Siwei Li
Multi-access edge computing (MEC) enhances service quality for users and reduces computational overhead by migrating workloads and application data to the network edge. However, current solutions for task offloading and cache replacement in edge scenarios are constrained by factors such as communication bandwidth, wireless network coverage, and limited storage capacity of edge devices, making it challenging to achieve high cache reuse and lower system energy consumption. To address these issues, a framework leveraging cooperative edge servers deployed in wireless access networks across different geographical regions is designed. Specifically, we propose the Distributed Edge Service Caching and Offloading (DESCO) network architecture and design a decentralized resource-sharing algorithm based on consistent hashing, named Cache Chord. Subsequently, based on DESCO and aiming to minimize overall user energy consumption while maintaining user latency constraints, we introduce the real-time computation offloading (RCO) problem and transform RCO into a multi-player static game, prove the existence of Nash equilibrium solutions, and solve it using a multi-dimensional particle swarm optimization algorithm. Finally, simulation results demonstrate that the proposed solution reduces the average energy consumption by over 27% in the DESCO network compared to existing algorithms.
多接入边缘计算(MEC)通过将工作负载和应用数据迁移到网络边缘,提高了用户的服务质量,降低了计算开销。然而,目前边缘场景中的任务卸载和高速缓存替换解决方案受到通信带宽、无线网络覆盖范围和边缘设备存储容量有限等因素的制约,使得实现高速缓存重用和降低系统能耗变得十分困难。为了解决这些问题,我们设计了一个利用部署在不同地理区域无线接入网中的合作边缘服务器的框架。具体来说,我们提出了分布式边缘服务缓存和卸载(DESCO)网络架构,并设计了一种基于一致散列的分散式资源共享算法,命名为 "缓存和弦"。随后,在 DESCO 的基础上,为了在保持用户延迟约束的同时最大限度地降低用户整体能耗,我们引入了实时计算卸载(RCO)问题,并将 RCO 转化为多人静态博弈,证明了纳什均衡解的存在,并使用多维粒子群优化算法对其进行求解。最后,仿真结果表明,与现有算法相比,所提出的解决方案可将 DESCO 网络的平均能耗降低 27% 以上。
{"title":"Computation Offloading Based on a Distributed Overlay Network Cache-Sharing Mechanism in Multi-Access Edge Computing","authors":"Yazhi Liu, Pengfei Zhong, Zhigang Yang, Wei Li, Siwei Li","doi":"10.3390/fi16040136","DOIUrl":"https://doi.org/10.3390/fi16040136","url":null,"abstract":"Multi-access edge computing (MEC) enhances service quality for users and reduces computational overhead by migrating workloads and application data to the network edge. However, current solutions for task offloading and cache replacement in edge scenarios are constrained by factors such as communication bandwidth, wireless network coverage, and limited storage capacity of edge devices, making it challenging to achieve high cache reuse and lower system energy consumption. To address these issues, a framework leveraging cooperative edge servers deployed in wireless access networks across different geographical regions is designed. Specifically, we propose the Distributed Edge Service Caching and Offloading (DESCO) network architecture and design a decentralized resource-sharing algorithm based on consistent hashing, named Cache Chord. Subsequently, based on DESCO and aiming to minimize overall user energy consumption while maintaining user latency constraints, we introduce the real-time computation offloading (RCO) problem and transform RCO into a multi-player static game, prove the existence of Nash equilibrium solutions, and solve it using a multi-dimensional particle swarm optimization algorithm. Finally, simulation results demonstrate that the proposed solution reduces the average energy consumption by over 27% in the DESCO network compared to existing algorithms.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140685345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions 智能家居异常检测机器学习方法综述:实验分析与未来方向
IF 3.4 Q1 Computer Science Pub Date : 2024-04-19 DOI: 10.3390/fi16040139
Md Motiur Rahman, Deepti Gupta, Smriti Bhatt, Shiva Shokouhmand, M. Faezipour
Detecting anomalies in human activities is increasingly crucial today, particularly in nuclear family settings, where there may not be constant monitoring of individuals’ health, especially the elderly, during critical periods. Early anomaly detection can prevent from attack scenarios and life-threatening situations. This task becomes notably more complex when multiple ambient sensors are deployed in homes with multiple residents, as opposed to single-resident environments. Additionally, the availability of datasets containing anomalies representing the full spectrum of abnormalities is limited. In our experimental study, we employed eight widely used machine learning and two deep learning classifiers to identify anomalies in human activities. We meticulously generated anomalies, considering all conceivable scenarios. Our findings reveal that the Gated Recurrent Unit (GRU) excels in accurately classifying normal and anomalous activities, while the naïve Bayes classifier demonstrates relatively poor performance among the ten classifiers considered. We conducted various experiments to assess the impact of different training–test splitting ratios, along with a five-fold cross-validation technique, on the performance. Notably, the GRU model consistently outperformed all other classifiers under both conditions. Furthermore, we offer insights into the computational costs associated with these classifiers, encompassing training and prediction phases. Extensive ablation experiments conducted in this study underscore that all these classifiers can effectively be deployed for anomaly detection in two-resident homes.
如今,检测人类活动中的异常情况越来越重要,特别是在核心家庭环境中,因为在关键时期可能无法持续监测个人健康状况,尤其是老年人的健康状况。早期异常检测可以防止攻击情景和危及生命的情况发生。与单人居住环境相比,如果在有多人居住的家庭中部署多个环境传感器,这项任务就会变得更加复杂。此外,包含代表所有异常情况的异常数据集的可用性也很有限。在我们的实验研究中,我们采用了八种广泛使用的机器学习和两种深度学习分类器来识别人类活动中的异常情况。我们精心生成了异常情况,考虑到了所有可以想象到的情况。我们的研究结果表明,门控循环单元(GRU)在准确分类正常和异常活动方面表现出色,而天真贝叶斯分类器在所考虑的十种分类器中表现相对较差。我们进行了各种实验,以评估不同的训练-测试分割比例以及五倍交叉验证技术对性能的影响。值得注意的是,在这两种条件下,GRU 模型的表现始终优于所有其他分类器。此外,我们还深入分析了与这些分类器相关的计算成本,包括训练和预测阶段。本研究中进行的大量消融实验表明,所有这些分类器都能有效地用于双居住宅的异常检测。
{"title":"A Comprehensive Review of Machine Learning Approaches for Anomaly Detection in Smart Homes: Experimental Analysis and Future Directions","authors":"Md Motiur Rahman, Deepti Gupta, Smriti Bhatt, Shiva Shokouhmand, M. Faezipour","doi":"10.3390/fi16040139","DOIUrl":"https://doi.org/10.3390/fi16040139","url":null,"abstract":"Detecting anomalies in human activities is increasingly crucial today, particularly in nuclear family settings, where there may not be constant monitoring of individuals’ health, especially the elderly, during critical periods. Early anomaly detection can prevent from attack scenarios and life-threatening situations. This task becomes notably more complex when multiple ambient sensors are deployed in homes with multiple residents, as opposed to single-resident environments. Additionally, the availability of datasets containing anomalies representing the full spectrum of abnormalities is limited. In our experimental study, we employed eight widely used machine learning and two deep learning classifiers to identify anomalies in human activities. We meticulously generated anomalies, considering all conceivable scenarios. Our findings reveal that the Gated Recurrent Unit (GRU) excels in accurately classifying normal and anomalous activities, while the naïve Bayes classifier demonstrates relatively poor performance among the ten classifiers considered. We conducted various experiments to assess the impact of different training–test splitting ratios, along with a five-fold cross-validation technique, on the performance. Notably, the GRU model consistently outperformed all other classifiers under both conditions. Furthermore, we offer insights into the computational costs associated with these classifiers, encompassing training and prediction phases. Extensive ablation experiments conducted in this study underscore that all these classifiers can effectively be deployed for anomaly detection in two-resident homes.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140683592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems 利用数字孪生技术加强网络物理生产系统的网络安全
IF 3.4 Q1 Computer Science Pub Date : 2024-04-17 DOI: 10.3390/fi16040134
Yuning Jiang, Wei Wang, Jianguo Ding, Xin Lu, Yanguo Jing
The convergence of cyber and physical systems through cyber–physical systems (CPSs) has been integrated into cyber–physical production systems (CPPSs), leading to a paradigm shift toward intelligent manufacturing. Despite the transformative benefits that CPPS provides, its increased connectivity exposes manufacturers to cyber-attacks through exploitable vulnerabilities. This paper presents a novel approach to CPPS security protection by leveraging digital twin (DT) technology to develop a comprehensive security model. This model enhances asset visibility and supports prioritization in mitigating vulnerable components through DT-based virtual tuning, providing quantitative assessment results for effective mitigation. Our proposed DT security model also serves as an advanced simulation environment, facilitating the evaluation of CPPS vulnerabilities across diverse attack scenarios without disrupting physical operations. The practicality and effectiveness of our approach are illustrated through its application in a human–robot collaborative assembly system, demonstrating the potential of DT technology.
通过网络物理系统(CPS)实现的网络与物理系统的融合已被整合到网络物理生产系统(CPPS)中,导致向智能制造的模式转变。尽管 CPPS 带来了变革性的好处,但其连接性的增强使制造商面临着可被利用的漏洞所带来的网络攻击。本文提出了一种新颖的 CPPS 安全保护方法,即利用数字孪生(DT)技术开发一种全面的安全模型。该模型提高了资产的可视性,并通过基于 DT 的虚拟调整支持优先缓解易受攻击的组件,为有效缓解提供量化评估结果。我们提出的 DT 安全模型还可作为先进的模拟环境,在不中断实际操作的情况下,帮助评估 CPPS 在各种攻击场景中的脆弱性。通过在人机协作装配系统中的应用,说明了我们的方法的实用性和有效性,展示了 DT 技术的潜力。
{"title":"Leveraging Digital Twin Technology for Enhanced Cybersecurity in Cyber–Physical Production Systems","authors":"Yuning Jiang, Wei Wang, Jianguo Ding, Xin Lu, Yanguo Jing","doi":"10.3390/fi16040134","DOIUrl":"https://doi.org/10.3390/fi16040134","url":null,"abstract":"The convergence of cyber and physical systems through cyber–physical systems (CPSs) has been integrated into cyber–physical production systems (CPPSs), leading to a paradigm shift toward intelligent manufacturing. Despite the transformative benefits that CPPS provides, its increased connectivity exposes manufacturers to cyber-attacks through exploitable vulnerabilities. This paper presents a novel approach to CPPS security protection by leveraging digital twin (DT) technology to develop a comprehensive security model. This model enhances asset visibility and supports prioritization in mitigating vulnerable components through DT-based virtual tuning, providing quantitative assessment results for effective mitigation. Our proposed DT security model also serves as an advanced simulation environment, facilitating the evaluation of CPPS vulnerabilities across diverse attack scenarios without disrupting physical operations. The practicality and effectiveness of our approach are illustrated through its application in a human–robot collaborative assembly system, demonstrating the potential of DT technology.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains 用区块链追踪建筑供应链中可持续材料再利用的出处
IF 3.4 Q1 Computer Science Pub Date : 2024-04-17 DOI: 10.3390/fi16040135
Stanly Wilson, Kwabena Adu-Duodu, Yinhao Li, Ringo W. H. Sham, Mohammed Almubarak, Yingli Wang, E. Solaiman, Charith Perera, R. Ranjan, Omer Rana
The growing complexity of construction supply chains and the significant impact of the construction industry on the environment demand an understanding of how to reuse and repurpose materials. In response to this critical challenge, research gaps that are significant in promoting material circularity are described. Despite its potential, the use of blockchain technology in construction faces challenges in verifiability, scalability, privacy, and interoperability. We propose a novel multilayer blockchain framework to enhance provenance tracking and data retrieval to enable a reliable audit trail. The framework utilises a privacy-centric solution that combines decentralised and centralised storage, security, and privacy. Furthermore, the framework implements access control to strengthen security and privacy, fostering transparency and information sharing among the stakeholders. These contributions collectively lead to trusted material circularity in a built environment. The implementation framework aims to create a prototype for blockchain applications in construction supply chains.
建筑供应链日益复杂,建筑业对环境产生了重大影响,这就要求我们了解如何对材料进行再利用和再利用。为应对这一严峻挑战,本文介绍了在促进材料循环性方面存在的重大研究缺口。尽管区块链技术潜力巨大,但其在建筑领域的应用却面临着可验证性、可扩展性、隐私性和互操作性等方面的挑战。我们提出了一个新颖的多层区块链框架,以加强出处跟踪和数据检索,从而实现可靠的审计跟踪。该框架采用以隐私为中心的解决方案,将分散和集中存储、安全性和隐私性结合在一起。此外,该框架还实施了访问控制,以加强安全性和隐私性,促进利益相关者之间的透明度和信息共享。这些贡献共同促成了建筑环境中的可信材料循环。该实施框架旨在为建筑供应链中的区块链应用创建一个原型。
{"title":"Blockchain-Enabled Provenance Tracking for Sustainable Material Reuse in Construction Supply Chains","authors":"Stanly Wilson, Kwabena Adu-Duodu, Yinhao Li, Ringo W. H. Sham, Mohammed Almubarak, Yingli Wang, E. Solaiman, Charith Perera, R. Ranjan, Omer Rana","doi":"10.3390/fi16040135","DOIUrl":"https://doi.org/10.3390/fi16040135","url":null,"abstract":"The growing complexity of construction supply chains and the significant impact of the construction industry on the environment demand an understanding of how to reuse and repurpose materials. In response to this critical challenge, research gaps that are significant in promoting material circularity are described. Despite its potential, the use of blockchain technology in construction faces challenges in verifiability, scalability, privacy, and interoperability. We propose a novel multilayer blockchain framework to enhance provenance tracking and data retrieval to enable a reliable audit trail. The framework utilises a privacy-centric solution that combines decentralised and centralised storage, security, and privacy. Furthermore, the framework implements access control to strengthen security and privacy, fostering transparency and information sharing among the stakeholders. These contributions collectively lead to trusted material circularity in a built environment. The implementation framework aims to create a prototype for blockchain applications in construction supply chains.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140691921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks 数据中心网络中基于反压反馈的拥塞控制机制
IF 3.4 Q1 Computer Science Pub Date : 2024-04-15 DOI: 10.3390/fi16040131
Wei Li, Mengzhen Ren, Yazhi Liu, Chenyu Li, Hui Qian, Zhenyou Zhang
In order to solve the congestion problem caused by the dramatic growth of traffic in data centers, many end-to-end congestion controls have been proposed to respond to congestion in one round-trip time (RTT). In this paper, we propose a new congestion control mechanism based on backpressure feedback (BFCC), which is designed with the primary goal of switch-to-switch congestion control to resolve congestion in a one-hop RTT. This approach utilizes a programmable data plane to continuously monitor network congestion in real time and identify real-congested flows. In addition, it employs targeted flow control through backpressure feedback. We validate the feasibility of this mechanism on BMV2, a programmable virtual switch based on programming protocol-independent packet processors (P4). Simulation results demonstrate that BFCC greatly enhances flow completion times (FCTs) compared to other end-to-end congestion control mechanisms. It achieves 1.2–2× faster average completion times than other mechanisms.
为了解决数据中心流量急剧增长所带来的拥塞问题,人们提出了许多端到端拥塞控制措施,以应对一个往返时间(RTT)内的拥塞。在本文中,我们提出了一种基于反压反馈(BFCC)的新拥塞控制机制,其设计的主要目标是交换机到交换机拥塞控制,以解决单跳 RTT 内的拥塞问题。这种方法利用可编程数据平面持续实时监控网络拥塞情况,并识别真正的拥塞流量。此外,它还通过反压反馈进行有针对性的流量控制。我们在 BMV2 上验证了这一机制的可行性,BMV2 是基于独立于协议的数据包处理器(P4)编程的可编程虚拟交换机。仿真结果表明,与其他端到端拥塞控制机制相比,BFCC 大大提高了流量完成时间(FCT)。它的平均完成时间比其他机制快 1.2-2 倍。
{"title":"Congestion Control Mechanism Based on Backpressure Feedback in Data Center Networks","authors":"Wei Li, Mengzhen Ren, Yazhi Liu, Chenyu Li, Hui Qian, Zhenyou Zhang","doi":"10.3390/fi16040131","DOIUrl":"https://doi.org/10.3390/fi16040131","url":null,"abstract":"In order to solve the congestion problem caused by the dramatic growth of traffic in data centers, many end-to-end congestion controls have been proposed to respond to congestion in one round-trip time (RTT). In this paper, we propose a new congestion control mechanism based on backpressure feedback (BFCC), which is designed with the primary goal of switch-to-switch congestion control to resolve congestion in a one-hop RTT. This approach utilizes a programmable data plane to continuously monitor network congestion in real time and identify real-congested flows. In addition, it employs targeted flow control through backpressure feedback. We validate the feasibility of this mechanism on BMV2, a programmable virtual switch based on programming protocol-independent packet processors (P4). Simulation results demonstrate that BFCC greatly enhances flow completion times (FCTs) compared to other end-to-end congestion control mechanisms. It achieves 1.2–2× faster average completion times than other mechanisms.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140700968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation 通过基于区块链的聚合实现联盟学习中的安全数据共享
IF 3.4 Q1 Computer Science Pub Date : 2024-04-15 DOI: 10.3390/fi16040133
Bowen Liu, Qiang Tang
In this paper, we explore the realm of federated learning (FL), a distributed machine learning (ML) paradigm, and propose a novel approach that leverages the robustness of blockchain technology. FL, a concept introduced by Google in 2016, allows multiple entities to collaboratively train an ML model without the need to expose their raw data. However, it faces several challenges, such as privacy concerns and malicious attacks (e.g., data poisoning attacks). Our paper examines the existing EIFFeL framework, a protocol for decentralized real-time messaging in continuous integration and delivery pipelines, and introduces an enhanced scheme that leverages the trustworthy nature of blockchain technology. Our scheme eliminates the need for a central server and any other third party, such as a public bulletin board, thereby mitigating the risks associated with the compromise of such third parties.
在本文中,我们探索了联合学习(FL)这一分布式机器学习(ML)范例的领域,并提出了一种利用区块链技术稳健性的新方法。FL是谷歌在2016年提出的一个概念,它允许多个实体协作训练一个ML模型,而无需暴露它们的原始数据。然而,它也面临着一些挑战,如隐私问题和恶意攻击(如数据中毒攻击)。我们的论文研究了现有的 EIFFeL 框架(一种用于持续集成和交付管道中分散式实时消息传递的协议),并介绍了一种利用区块链技术可信特性的增强型方案。我们的方案不需要中央服务器和任何其他第三方(如公共公告板),从而降低了与第三方妥协相关的风险。
{"title":"Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation","authors":"Bowen Liu, Qiang Tang","doi":"10.3390/fi16040133","DOIUrl":"https://doi.org/10.3390/fi16040133","url":null,"abstract":"In this paper, we explore the realm of federated learning (FL), a distributed machine learning (ML) paradigm, and propose a novel approach that leverages the robustness of blockchain technology. FL, a concept introduced by Google in 2016, allows multiple entities to collaboratively train an ML model without the need to expose their raw data. However, it faces several challenges, such as privacy concerns and malicious attacks (e.g., data poisoning attacks). Our paper examines the existing EIFFeL framework, a protocol for decentralized real-time messaging in continuous integration and delivery pipelines, and introduces an enhanced scheme that leverages the trustworthy nature of blockchain technology. Our scheme eliminates the need for a central server and any other third party, such as a public bulletin board, thereby mitigating the risks associated with the compromise of such third parties.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":null,"pages":null},"PeriodicalIF":3.4,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140703325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1