首页 > 最新文献

IET Networks最新文献

英文 中文
An improved affinity propagation method for maximising system sum rate and minimising interference for 3D multi-UAV placement in disaster area
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-24 DOI: 10.1049/ntw2.12143
Nooshin Boroumand Jazi, Farhad Faghani, Mahmoud Daneshvar Farzanegan

In emergencies where several ground base stations (GBS) are no longer available, mobile base stations based on unmanned aerial vehicles (UAVs) can efficiently resolve coverage issues in remote areas due to their cost-effectiveness and versatility. Natural disasters, such as a deluge, cause damage to the terrestrial wireless infrastructure. The main challenge in these systems is to determine the optimal 3D placement of UAVs to meet the dynamic demand of users and minimise interference. Various mathematical frameworks and efficient algorithms are suggested for designing, optimising, and deploying UAV-based communication systems. This paper investigates the challenges of 3D UAV placement through machine learning (ML) and enhanced affinity propagation (EAP). Lastly, the simulation results indicate that the proposed approach improves the system sum rate, interference, and coverage performance compared to DBSCAN, k-means, and k-means++ methods. Therefore, this paper identifies UAVs' most effective 3D placement, including minimising the number of UAVs, maximising the number of covered users, and maximising the system sum rate for an arbitrary distribution of users in the disaster area. Additionally, this paper addresses the issue of interference minimisation.

{"title":"An improved affinity propagation method for maximising system sum rate and minimising interference for 3D multi-UAV placement in disaster area","authors":"Nooshin Boroumand Jazi,&nbsp;Farhad Faghani,&nbsp;Mahmoud Daneshvar Farzanegan","doi":"10.1049/ntw2.12143","DOIUrl":"https://doi.org/10.1049/ntw2.12143","url":null,"abstract":"<p>In emergencies where several ground base stations (GBS) are no longer available, mobile base stations based on unmanned aerial vehicles (UAVs) can efficiently resolve coverage issues in remote areas due to their cost-effectiveness and versatility. Natural disasters, such as a deluge, cause damage to the terrestrial wireless infrastructure. The main challenge in these systems is to determine the optimal 3D placement of UAVs to meet the dynamic demand of users and minimise interference. Various mathematical frameworks and efficient algorithms are suggested for designing, optimising, and deploying UAV-based communication systems. This paper investigates the challenges of 3D UAV placement through machine learning (ML) and enhanced affinity propagation (EAP). Lastly, the simulation results indicate that the proposed approach improves the system sum rate, interference, and coverage performance compared to DBSCAN, k-means, and k-means++ methods. Therefore, this paper identifies UAVs' most effective 3D placement, including minimising the number of UAVs, maximising the number of covered users, and maximising the system sum rate for an arbitrary distribution of users in the disaster area. Additionally, this paper addresses the issue of interference minimisation.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12143","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority-based resource optimisation and user association in integrated networks
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-24 DOI: 10.1049/ntw2.12140
Sana Sharif, Shahid Manzoor, Waleed Ejaz

The future sixth-generation (6G) networks are envisioned to integrate satellites, aerial, ground, and sea networks to provide seamless connectivity. However, some challenges are associated with integrated networks, including optimal resource utilisation, energy efficiency, delay, higher data rates, heterogeneity, and on-demand connectivity. This paper focuses on optimising energy efficiency, resource utilisation, and task priority-based user association. To achieve this, a mathematical framework is formulated to maximise energy efficiency, resource utilisation, and user connectivity in integrated networks while satisfying constraints related to transmit power, data rate, and computation resources. The formulated problem is a binary linear programming problem, as the decision variable is binary and the constraints are linear. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA). The authors use the results obtained from BBA as a benchmark to evaluate the performance of IPM and BSA. Simulation results show that the performance of IPM and BSA is comparable to the BBA but with lower complexity.

{"title":"Priority-based resource optimisation and user association in integrated networks","authors":"Sana Sharif,&nbsp;Shahid Manzoor,&nbsp;Waleed Ejaz","doi":"10.1049/ntw2.12140","DOIUrl":"https://doi.org/10.1049/ntw2.12140","url":null,"abstract":"<p>The future sixth-generation (6G) networks are envisioned to integrate satellites, aerial, ground, and sea networks to provide seamless connectivity. However, some challenges are associated with integrated networks, including optimal resource utilisation, energy efficiency, delay, higher data rates, heterogeneity, and on-demand connectivity. This paper focuses on optimising energy efficiency, resource utilisation, and task priority-based user association. To achieve this, a mathematical framework is formulated to maximise energy efficiency, resource utilisation, and user connectivity in integrated networks while satisfying constraints related to transmit power, data rate, and computation resources. The formulated problem is a binary linear programming problem, as the decision variable is binary and the constraints are linear. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA). The authors use the results obtained from BBA as a benchmark to evaluate the performance of IPM and BSA. Simulation results show that the performance of IPM and BSA is comparable to the BBA but with lower complexity.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management 智能森林监测:采用最短路径路由的新型物联网框架,促进可持续环境管理
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-22 DOI: 10.1049/ntw2.12135
Alireza Etaati, Mostafa Bastam, Ehsan Ataie

Forests play a pivotal role in protecting the environment, preserving vital natural resources, and ultimately sustaining human life. However, the escalating occurrences of forest fires, whether of human origin or due to climate change, poses a significant threat to this ecosystem. In recent decades, the emergence of the IoT has been characterised by the utilisation of smart sensors for real-time data collection. IoT facilitates proactive decision-making for forest monitoring, control, and protection through advanced data analysis techniques, including AI algorithms. This research study presents a comprehensive approach to deploying a dynamic and adaptable network topology in forest environments, aimed at optimising data transmission and enhancing system reliability. Three distinct topologies are proposed in this research study: direct transmission from nodes to gateways, cluster formation with multi-step data transmission, and clustering with data relayed by cluster heads. A key innovation is the use of high-powered telecommunication modules in cluster heads, enabling long-range data transmission while considering energy efficiency through solar power. To enhance system reliability, this study incorporates a reserve routing mechanism to mitigate the impact of node or cluster head failures. Additionally, the placement of gateway nodes is optimised using meta-heuristic algorithms, including particle swarm optimisation (PSO), harmony search algorithm (HSA), and ant colony optimisation for continuous domains (ACOR), with ACOR emerging as the most effective. The primary objective of this article is to reduce power consumption, alleviate network traffic, and decrease nodes' interdependence, while also considering reliability coefficients and error tolerance as additional considerations. As shown in the results, the proposed methods effectively reduce network traffic, optimise routing, and ensure robust performance across various environmental conditions, highlighting the importance of these tailored topologies in enhancing energy efficiency, data accuracy, and network reliability in forest monitoring applications.

森林在保护环境、保存重要自然资源以及最终维持人类生活方面发挥着举足轻重的作用。然而,无论是人为因素还是气候变化导致的森林火灾不断升级,都对这一生态系统构成了重大威胁。近几十年来,物联网的特点是利用智能传感器进行实时数据收集。物联网通过先进的数据分析技术,包括人工智能算法,为森林监测、控制和保护的前瞻性决策提供了便利。本研究提出了一种在森林环境中部署动态、适应性强的网络拓扑的综合方法,旨在优化数据传输和提高系统可靠性。本研究提出了三种不同的拓扑结构:从节点到网关的直接传输、多步骤数据传输的集群形成,以及由集群首脑转发数据的集群。一个关键的创新是在簇头中使用大功率电信模块,从而实现远距离数据传输,同时考虑到通过太阳能发电的能源效率。为提高系统可靠性,本研究采用了一种储备路由机制,以减轻节点或簇头故障的影响。此外,还使用元启发式算法优化了网关节点的位置,包括粒子群优化算法(PSO)、和谐搜索算法(HSA)和连续域蚁群优化算法(ACOR),其中 ACOR 最为有效。本文的主要目标是降低功耗、减轻网络流量和减少节点的相互依赖性,同时还将可靠性系数和容错性作为额外的考虑因素。结果表明,所提出的方法有效地减少了网络流量,优化了路由,并确保了在各种环境条件下的稳健性能,突出了这些量身定制的拓扑结构在提高森林监测应用的能效、数据准确性和网络可靠性方面的重要性。
{"title":"Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management","authors":"Alireza Etaati,&nbsp;Mostafa Bastam,&nbsp;Ehsan Ataie","doi":"10.1049/ntw2.12135","DOIUrl":"https://doi.org/10.1049/ntw2.12135","url":null,"abstract":"<p>Forests play a pivotal role in protecting the environment, preserving vital natural resources, and ultimately sustaining human life. However, the escalating occurrences of forest fires, whether of human origin or due to climate change, poses a significant threat to this ecosystem. In recent decades, the emergence of the IoT has been characterised by the utilisation of smart sensors for real-time data collection. IoT facilitates proactive decision-making for forest monitoring, control, and protection through advanced data analysis techniques, including AI algorithms. This research study presents a comprehensive approach to deploying a dynamic and adaptable network topology in forest environments, aimed at optimising data transmission and enhancing system reliability. Three distinct topologies are proposed in this research study: direct transmission from nodes to gateways, cluster formation with multi-step data transmission, and clustering with data relayed by cluster heads. A key innovation is the use of high-powered telecommunication modules in cluster heads, enabling long-range data transmission while considering energy efficiency through solar power. To enhance system reliability, this study incorporates a reserve routing mechanism to mitigate the impact of node or cluster head failures. Additionally, the placement of gateway nodes is optimised using meta-heuristic algorithms, including particle swarm optimisation (PSO), harmony search algorithm (HSA), and ant colony optimisation for continuous domains (ACOR), with ACOR emerging as the most effective. The primary objective of this article is to reduce power consumption, alleviate network traffic, and decrease nodes' interdependence, while also considering reliability coefficients and error tolerance as additional considerations. As shown in the results, the proposed methods effectively reduce network traffic, optimise routing, and ensure robust performance across various environmental conditions, highlighting the importance of these tailored topologies in enhancing energy efficiency, data accuracy, and network reliability in forest monitoring applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"528-545"},"PeriodicalIF":1.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method 基于 ECIE 方法分析 VANET 中 AODV、OLSR 和 DSDV 路由协议的性能
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-17 DOI: 10.1049/ntw2.12136
Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel

In a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the dissemination of different types of messages, such as those for emergencies or traffic updates. However, previous research has not sufficiently addressed the challenges of energy efficiency, security, and reliability in VANET routing. This work aims to fill that gap by analysing the performance of three major VANET routing protocols—ad hoc on-demand distance vector (AODV), Optimised Link State Routing (OLSR), and Destination Sequenced Distance Vector—integrated with elliptic curve integrated encryption. The goal is to determine the most suitable routing protocol based on these key parameters. The study involves two key processes: registration and authentication, and the analysis of ECIE-enhanced routing protocols (ECIE-AODV, ECIE-OLSR, and ECIE-DSDV). These protocols were simulated using OMNET++ and SUMO tools, and the results were evaluated based on metrics such as throughput, packet delivery ratio, end-to-end delay (e2e), jitter, and routing overhead.

在车载临时网络(VANET)中,车辆之间(V2V)以及车辆与基础设施(V2I)之间进行通信,以优化路由并高效到达目的地。VANET 环境中的各种路由协议有助于传播不同类型的信息,如紧急情况或交通更新信息。然而,以往的研究并没有充分解决 VANET 路由中的能效、安全性和可靠性挑战。这项工作旨在通过分析三种主要 VANET 路由协议的性能来填补这一空白,这三种协议是:椭圆曲线集成加密的临时按需距离矢量(AODV)、优化链路状态路由(OLSR)和目的地排序距离矢量。目标是根据这些关键参数确定最合适的路由协议。研究涉及两个关键过程:注册和验证,以及对 ECIE 增强路由协议(ECIE-AODV、ECIE-OLSR 和 ECIE-DSDV)的分析。使用 OMNET++ 和 SUMO 工具对这些协议进行了模拟,并根据吞吐量、数据包传送率、端到端延迟(e2e)、抖动和路由开销等指标对结果进行了评估。
{"title":"Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method","authors":"Moawiah El-Dalahmeh,&nbsp;Adi El-Dalahmeh,&nbsp;Usman Adeel","doi":"10.1049/ntw2.12136","DOIUrl":"https://doi.org/10.1049/ntw2.12136","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>In a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the dissemination of different types of messages, such as those for emergencies or traffic updates. However, previous research has not sufficiently addressed the challenges of energy efficiency, security, and reliability in VANET routing. This work aims to fill that gap by analysing the performance of three major VANET routing protocols—ad hoc on-demand distance vector (AODV), Optimised Link State Routing (OLSR), and Destination Sequenced Distance Vector—integrated with elliptic curve integrated encryption. The goal is to determine the most suitable routing protocol based on these key parameters. The study involves two key processes: registration and authentication, and the analysis of ECIE-enhanced routing protocols (ECIE-AODV, ECIE-OLSR, and ECIE-DSDV). These protocols were simulated using OMNET++ and SUMO tools, and the results were evaluated based on metrics such as throughput, packet delivery ratio, end-to-end delay (e2e), jitter, and routing overhead.</p>\u0000 </section>\u0000 </div>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"377-394"},"PeriodicalIF":1.3,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks 检测物联网网络零日分布式拒绝服务攻击的无监督方法
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-08 DOI: 10.1049/ntw2.12134
Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, Balasubramaniyan Chandrasekaran

The authors introduce an unsupervised Intrusion Detection System designed to detect zero-day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training on attack information. Zero-day attacks exploit previously unknown vulnerabilities, making them hard to detect with traditional deep learning and machine learning systems that require pre-labelled data. Labelling data is also a time-consuming task for security experts. Therefore, unsupervised methods are necessary to detect these new threats. The authors focus on DDoS attacks, which have recently caused significant financial and service disruptions for many organisations. As IoT networks grow, these attacks become more sophisticated and harmful. The proposed approach detects zero-day DDoS attacks by using random projection to reduce data dimensionality and an ensemble model combining K-means, Gaussian mixture model, and one-class SVM with a hard voting technique for classification. The method was evaluated using the CIC-DDoS2019 dataset and achieved an accuracy of 94.55%, outperforming other state-of-the-art unsupervised learning methods.

作者介绍了一种无监督入侵检测系统,旨在检测物联网(IoT)网络中的零日分布式拒绝服务(DDoS)攻击。该系统无需事先了解攻击信息或接受相关培训,即可识别异常情况。零日攻击利用的是以前未知的漏洞,因此传统的深度学习和机器学习系统很难检测到它们,因为它们需要预先标记数据。对于安全专家来说,标记数据也是一项耗时的任务。因此,有必要采用无监督方法来检测这些新威胁。作者重点介绍了 DDoS 攻击,这种攻击最近给许多组织造成了严重的财务和服务中断。随着物联网网络的发展,这些攻击变得更加复杂和有害。所提出的方法通过使用随机投影来降低数据维度,并结合 K-means、高斯混合模型、单类 SVM 和硬投票技术的组合模型来进行分类,从而检测零日 DDoS 攻击。该方法使用 CIC-DDoS2019 数据集进行了评估,准确率达到 94.55%,优于其他最先进的无监督学习方法。
{"title":"An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks","authors":"Monika Roopak,&nbsp;Simon Parkinson,&nbsp;Gui Yun Tian,&nbsp;Yachao Ran,&nbsp;Saad Khan,&nbsp;Balasubramaniyan Chandrasekaran","doi":"10.1049/ntw2.12134","DOIUrl":"https://doi.org/10.1049/ntw2.12134","url":null,"abstract":"<p>The authors introduce an unsupervised Intrusion Detection System designed to detect zero-day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training on attack information. Zero-day attacks exploit previously unknown vulnerabilities, making them hard to detect with traditional deep learning and machine learning systems that require pre-labelled data. Labelling data is also a time-consuming task for security experts. Therefore, unsupervised methods are necessary to detect these new threats. The authors focus on DDoS attacks, which have recently caused significant financial and service disruptions for many organisations. As IoT networks grow, these attacks become more sophisticated and harmful. The proposed approach detects zero-day DDoS attacks by using random projection to reduce data dimensionality and an ensemble model combining K-means, Gaussian mixture model, and one-class SVM with a hard voting technique for classification. The method was evaluated using the CIC-DDoS2019 dataset and achieved an accuracy of 94.55%, outperforming other state-of-the-art unsupervised learning methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"513-527"},"PeriodicalIF":1.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective ensemble electricity theft detection algorithm for smart grid 用于智能电网的有效集合窃电检测算法
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-02 DOI: 10.1049/ntw2.12132
Chun-Wei Tsai, Chi-Tse Lu, Chun-Hua Li, Shuo-Wen Zhang

Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develop an effective detection algorithm that leverages the strengths of different learning algorithms. To demonstrate the performance of such an integrated detection model, the algorithm proposed first builds on deep neural networks, a meta-learner for determining the weights of detection models for the construction of an ensemble detection algorithm and then uses a promising metaheuristic algorithm named search economics to optimise the hyperparameters of the meta-learner. Experimental results show that the proposed algorithm is able to find better results and outperforms all the other state-of-the-art detection algorithms for electricity theft detection compared in terms of the accuracy, F1-score, area under the curve of precision-recall (AUC-PR), and area under the curve of receiver operating characteristic (AUC-ROC). Since the results show that the meta-learner of the proposed algorithm can improve the accuracy of deep learning algorithms, the authors expect that it will be used in other deep learning-based applications.

由于取得了许多成功的结果,最近的研究提出了几种机器学习和深度学习算法来检测智能电网环境中的犯罪行为。然而,大多数用于窃电检测的学习算法都各有利弊;因此,如何开发一种有效的检测算法,充分利用不同学习算法的优势,一直是当今研究的关键问题。为了证明这种集成检测模型的性能,所提出的算法首先建立在深度神经网络的基础上,利用元学习器来确定检测模型的权重,从而构建一个集合检测算法,然后使用一种名为搜索经济学的有前途的元启发式算法来优化元学习器的超参数。实验结果表明,所提出的算法能够找到更好的结果,并且在准确率、F1-分数、精度-召回曲线下面积(AUC-PR)和接收者操作特征曲线下面积(AUC-ROC)等方面都优于所有其他最先进的窃电检测算法。由于结果表明,所提算法的元学习器可以提高深度学习算法的准确性,作者期待它能在其他基于深度学习的应用中得到应用。
{"title":"An effective ensemble electricity theft detection algorithm for smart grid","authors":"Chun-Wei Tsai,&nbsp;Chi-Tse Lu,&nbsp;Chun-Hua Li,&nbsp;Shuo-Wen Zhang","doi":"10.1049/ntw2.12132","DOIUrl":"https://doi.org/10.1049/ntw2.12132","url":null,"abstract":"<p>Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develop an effective detection algorithm that leverages the strengths of different learning algorithms. To demonstrate the performance of such an integrated detection model, the algorithm proposed first builds on deep neural networks, a meta-learner for determining the weights of detection models for the construction of an ensemble detection algorithm and then uses a promising metaheuristic algorithm named search economics to optimise the hyperparameters of the meta-learner. Experimental results show that the proposed algorithm is able to find better results and outperforms all the other state-of-the-art detection algorithms for electricity theft detection compared in terms of the accuracy, F1-score, area under the curve of precision-recall (AUC-PR), and area under the curve of receiver operating characteristic (AUC-ROC). Since the results show that the meta-learner of the proposed algorithm can improve the accuracy of deep learning algorithms, the authors expect that it will be used in other deep learning-based applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"471-485"},"PeriodicalIF":1.3,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM) 独立于硬状态协议的组播--特定于源的组播(HPIM-SSM)
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1049/ntw2.12133
Ana Catarina Grilo, Pedro Oliveira, Rui Valadas

Source-specific multicast is a key technology for multicast services such as IPTV broadcasting, which relies on IGMPv3/MLDv2 for source-group membership signalling and multicast routing protocols such as PIM-SSM for building and maintaining receiver-initiated source-based distribution trees across the network. The authors propose the Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM), a novel multicast routing protocol that keeps the design principles of PIM-SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees. The state machines of HPIM-SSM were designed to react promptly to all network events susceptible to reconfiguring the multicast trees, avoiding the need for soft-state maintenance through the periodic transmission of control messages. Moreover, the authors eliminated the need for designated routers, which led to suboptimal trees, and introduced a control-driven assert protocol that operates per source, allowing for considerable memory savings. Finally, the protocol enables the coexistence of multiple unicast routing protocols. HPIM-SSM was implemented in Python, and its correctness was extensively validated through model-checking techniques. Furthermore, a comparison between HPIM-SSM and PIM-SSM was conducted, encompassing both theoretical analysis and experimental evaluation of convergence times. The results demonstrate clearly that HPIM-SSM outperforms PIM-SSM, exhibiting significantly faster convergence times and completely avoiding suboptimal trees.

特定于源的组播是 IPTV 广播等组播服务的一项关键技术,它依赖 IGMPv3/MLDv2 来发送源组成员信号,并依赖 PIM-SSM 等组播路由协议来构建和维护整个网络中由接收器启动的基于源的分布树。作者提出了硬状态协议独立组播-源特定组播(HPIM-SSM),这是一种新型组播路由协议,它保留了 PIM-SSM 的设计原则,但克服了其局限性,如收敛速度慢和可能创建次优树。HPIM-SSM 的状态机被设计为能对所有易受重新配置组播树影响的网络事件做出迅速反应,从而避免了通过定期传输控制信息进行软状态维护的需要。此外,作者还消除了对指定路由器的需求(指定路由器会导致树的次优化),并引入了一种按源运行的控制驱动断言协议,从而节省了大量内存。最后,该协议实现了多个单播路由协议的共存。HPIM-SSM 是用 Python 实现的,其正确性通过模型检查技术得到了广泛验证。此外,还对 HPIM-SSM 和 PIM-SSM 进行了比较,包括理论分析和收敛时间的实验评估。结果清楚地表明,HPIM-SSM 优于 PIM-SSM,收敛时间明显更快,而且完全避免了次优树。
{"title":"Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM)","authors":"Ana Catarina Grilo,&nbsp;Pedro Oliveira,&nbsp;Rui Valadas","doi":"10.1049/ntw2.12133","DOIUrl":"https://doi.org/10.1049/ntw2.12133","url":null,"abstract":"<p>Source-specific multicast is a key technology for multicast services such as IPTV broadcasting, which relies on IGMPv3/MLDv2 for source-group membership signalling and multicast routing protocols such as PIM-SSM for building and maintaining receiver-initiated source-based distribution trees across the network. The authors propose the Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM), a novel multicast routing protocol that keeps the design principles of PIM-SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees. The state machines of HPIM-SSM were designed to react promptly to all network events susceptible to reconfiguring the multicast trees, avoiding the need for soft-state maintenance through the periodic transmission of control messages. Moreover, the authors eliminated the need for designated routers, which led to suboptimal trees, and introduced a control-driven assert protocol that operates per source, allowing for considerable memory savings. Finally, the protocol enables the coexistence of multiple unicast routing protocols. HPIM-SSM was implemented in Python, and its correctness was extensively validated through model-checking techniques. Furthermore, a comparison between HPIM-SSM and PIM-SSM was conducted, encompassing both theoretical analysis and experimental evaluation of convergence times. The results demonstrate clearly that HPIM-SSM outperforms PIM-SSM, exhibiting significantly faster convergence times and completely avoiding suboptimal trees.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"486-512"},"PeriodicalIF":1.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12133","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks 在支持非正交多址接入的 B5G/6G 网络中分配资源的详细强化学习框架
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-11 DOI: 10.1049/ntw2.12131
Nouri Omheni, Anis Amiri, Faouzi Zarai

The world of communications technology has recently undergone an extremely significant revolution. This revolution is an immediate consequence of the immersion that the fifth generation B5G and 6G have just brought. The latter responds to the growing need for connectivity and it improves the speeds and qualities of the mobile connection. To improve the energy and spectral efficiency of these types of networks, the non-orthogonal multiple access (NOMA) technique is seen as the key solution that can accommodate more users and dramatically improve spectrum efficiency. The basic idea of NOMA is to achieve multiple access in the power sector and decode the required signal via continuous interference cancelation. A resource allocation approach is proposed for the B5G/6G-NOMA network that aims to maximise system throughput, spectrum and energy efficiency and fairness among users while minimising latency. The proposed approach is based on reinforcement learning (RL) with the use of the Q-Learning algorithm. First, the process of resource allocation as a problem of maximising rewards is formulated. Next, the Q-Learning algorithm is used to design a resource allocation algorithm based on RL. The results of the simulation confirm that the proposed scheme is feasible and efficient.

通信技术世界最近经历了一场极其重大的革命。这场革命是第五代 B5G 和 6G 带来的直接后果。后者满足了人们日益增长的连接需求,提高了移动连接的速度和质量。为了提高这类网络的能效和频谱效率,非正交多址接入(NOMA)技术被视为关键的解决方案,它可以容纳更多用户,并显著提高频谱效率。非正交多址技术的基本思想是在功率扇区实现多址接入,并通过连续干扰消除对所需信号进行解码。本文为 B5G/6G-NOMA 网络提出了一种资源分配方法,旨在最大限度地提高系统吞吐量、频谱和能效以及用户间的公平性,同时最大限度地减少延迟。所提方法基于强化学习(RL),使用 Q-Learning 算法。首先,将资源分配过程表述为报酬最大化问题。然后,利用 Q-Learning 算法设计了基于 RL 的资源分配算法。仿真结果证实,所提出的方案是可行且高效的。
{"title":"A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks","authors":"Nouri Omheni,&nbsp;Anis Amiri,&nbsp;Faouzi Zarai","doi":"10.1049/ntw2.12131","DOIUrl":"https://doi.org/10.1049/ntw2.12131","url":null,"abstract":"<p>The world of communications technology has recently undergone an extremely significant revolution. This revolution is an immediate consequence of the immersion that the fifth generation B5G and 6G have just brought. The latter responds to the growing need for connectivity and it improves the speeds and qualities of the mobile connection. To improve the energy and spectral efficiency of these types of networks, the non-orthogonal multiple access (NOMA) technique is seen as the key solution that can accommodate more users and dramatically improve spectrum efficiency. The basic idea of NOMA is to achieve multiple access in the power sector and decode the required signal via continuous interference cancelation. A resource allocation approach is proposed for the B5G/6G-NOMA network that aims to maximise system throughput, spectrum and energy efficiency and fairness among users while minimising latency. The proposed approach is based on reinforcement learning (RL) with the use of the Q-Learning algorithm. First, the process of resource allocation as a problem of maximising rewards is formulated. Next, the Q-Learning algorithm is used to design a resource allocation algorithm based on RL. The results of the simulation confirm that the proposed scheme is feasible and efficient.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"455-470"},"PeriodicalIF":1.3,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12131","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Configuration of multi-shaper Time-Sensitive Networking for industrial applications 为工业应用配置多分频器时敏网络
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-30 DOI: 10.1049/ntw2.12129
Paul Pop, Konstantinos Alexandris, Tongtong Wang

IEEE 802.1 Time-Sensitive Networking (TSN) has proposed several shapers, for example, time-aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit-based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi-shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi-CQF combinations. The authors first propose multi-shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi-shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.

IEEE 802.1 时敏网络(TSN)提出了几种整形器,例如时间感知整形器(TAS,802.1Qbv)、异步流量整形器(ATS,802.1Qcr)、基于信用的整形器(CBS,802.1Qav)以及循环队列和转发(CQF,802.1Qch)。这些整形器各有优缺点,可以单独使用,也可以组合使用,以满足工业应用流的不同定时要求。关于如何分析和配置整形器组合的研究非常有限。作者对多整形器 TSN 网络的配置优化很感兴趣,目标是 TAS + CBS、TAS + ATS 和 TAS + Multi-CQF 组合。作者首先提出了多整形器集成方法,重点是 TAS + ATS 的新颖迭代延迟分析、通过对 TAS 调度以及 TAS 和 CBS 集成施加约束来集成 TAS 和 CQF 的方法。我们提出了配置多整形器 TSN 网络的组合优化问题,其中包括流的路由选择、向出口端口队列分配流以及合成 TAS 的门控列表等。然后,作者提出了一种基于模拟退火元搜索的解决方案。作者在多达数万个流和设备的大型实际测试案例中对所提出的解决方案进行了评估。
{"title":"Configuration of multi-shaper Time-Sensitive Networking for industrial applications","authors":"Paul Pop,&nbsp;Konstantinos Alexandris,&nbsp;Tongtong Wang","doi":"10.1049/ntw2.12129","DOIUrl":"https://doi.org/10.1049/ntw2.12129","url":null,"abstract":"<p>IEEE 802.1 Time-Sensitive Networking (TSN) has proposed several shapers, for example, time-aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit-based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi-shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi-CQF combinations. The authors first propose multi-shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi-shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"434-454"},"PeriodicalIF":1.3,"publicationDate":"2024-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges 异常网络入侵检测系统的元分析和系统综述:检测方法、数据集、验证方法和挑战
IF 1.3 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1049/ntw2.12128
Ziadoon K. Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander, Robiah Yusof, Abdu Saif

Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta-analysis to provide an in-depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS-based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.

建立在人工智能(AI)基础上的入侵检测系统是主动检测复杂网络上新攻击的潜在机制。作者采用定性方法系统地分析和评估了网络入侵检测系统(NIDS)的性能。不过,他们的方法也有局限性,因为这种方法只通过分析和总结数据比较找出差距,而没有考虑对 NIDS 性能进行定量测量。作者详细讨论了各种深度学习(DL)方法,并根据网络和攻击类型的基础架构解释了数据入侵网络。作者的主要贡献在于利用荟萃分析法进行了系统综述,对近期著名作品中的深度学习和传统机器学习(ML)进行了深入分析。作者评估了验证方法,并阐明了与数据集入侵、检测到的攻击和分类任务相关的最新趋势,以改进基于 NIDS 的出版物中的传统 ML 和 DL。最后,作者还讨论了网络安全面临的新风险和复杂性所带来的挑战和未来发展。
{"title":"Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges","authors":"Ziadoon K. Maseer,&nbsp;Qusay Kanaan Kadhim,&nbsp;Baidaa Al-Bander,&nbsp;Robiah Yusof,&nbsp;Abdu Saif","doi":"10.1049/ntw2.12128","DOIUrl":"https://doi.org/10.1049/ntw2.12128","url":null,"abstract":"<p>Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta-analysis to provide an in-depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS-based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"339-376"},"PeriodicalIF":1.3,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1