首页 > 最新文献

IET Networks最新文献

英文 中文
Vasicek and Van Es entropy-based spectrum sensing for cognitive radios 基于熵的认知无线电频谱传感
IF 1.4 Q1 Mathematics Pub Date : 2023-07-19 DOI: 10.1049/ntw2.12096
Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath

Accurate detection of spectrum holes is a useful requirement for cognitive radios that improves the efficiency of spectrum usage. The authors propose three novel, simple, and entropy-based detectors for spectrum sensing in cognitive radio. The authors evaluate the probability of detection of these three detectors: Vasicek's entropy detector, truncated Vasicek's entropy detector, and Van Es' entropy detector, over a predefined probability of false-alarm. In particular, the authors provide the approximate and asymptotic test statistics for these detectors in the presence and absence of Nakagami-m fading, noise variance uncertainty, and optimised detection threshold. Furthermore, the authors provide a detailed comparison study among all the detectors via Monte Carlo simulations and justify authors results through real-world data. The authors’ experimental results establish a superior performance of truncated Vasicek's entropy detector over Vasicek's entropy detector, energy detector, differential entropy detector and Van Es' entropy detector in practically viable scenarios.

准确检测频谱空洞是认知无线电的一项有用要求,可提高频谱使用效率。作者为认知无线电中的频谱感知提出了三种新颖、简单和基于熵的检测器。作者评估了这三种检测器的检测概率:Vasicek熵检测器、截断 Vasicek熵检测器和 Van Es熵检测器的误报概率。作者特别提供了这些检测器在存在或不存在中上衰减、噪声方差不确定性和优化检测阈值时的近似和渐近检测统计量。此外,作者还通过蒙特卡罗模拟对所有检测器进行了详细的比较研究,并通过实际数据证明了作者的研究结果。作者的实验结果表明,在实际可行的情况下,截断瓦西切克熵检测器的性能优于瓦西切克熵检测器、能量检测器、差分熵检测器和 Van Es熵检测器。
{"title":"Vasicek and Van Es entropy-based spectrum sensing for cognitive radios","authors":"Sutapa Sarkar,&nbsp;R. Muralishankar,&nbsp;Sanjeev Gurugopinath","doi":"10.1049/ntw2.12096","DOIUrl":"10.1049/ntw2.12096","url":null,"abstract":"<p>Accurate detection of spectrum holes is a useful requirement for cognitive radios that improves the efficiency of spectrum usage. The authors propose three novel, simple, and entropy-based detectors for spectrum sensing in cognitive radio. The authors evaluate the probability of detection of these three detectors: Vasicek's entropy detector, truncated Vasicek's entropy detector, and Van Es' entropy detector, over a predefined probability of false-alarm. In particular, the authors provide the approximate and asymptotic test statistics for these detectors in the presence and absence of Nakagami-<i>m</i> fading, noise variance uncertainty, and optimised detection threshold. Furthermore, the authors provide a detailed comparison study among all the detectors via Monte Carlo simulations and justify authors results through real-world data. The authors’ experimental results establish a superior performance of truncated Vasicek's entropy detector over Vasicek's entropy detector, energy detector, differential entropy detector and Van Es' entropy detector in practically viable scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of a mobile hotspot supporting quasi-random traffic 支持准随机流量的移动热点性能评估
IF 1.4 Q1 Mathematics Pub Date : 2023-07-13 DOI: 10.1049/ntw2.12093
Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis

The authors study and evaluate a mobility-aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi-random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three-dimensional Markov chains.

研究并评估了一种移动热点下的移动感知呼叫接纳控制算法。更具体地说,考虑具有固定容量的接入点并且可以在停止和移动阶段之间交替的车辆。在停止阶段,车辆服务新的和移交呼叫。为了优先考虑切换呼叫,考虑了概率带宽保留策略,其中为切换呼叫保留了一部分容量。基于此策略,新的调用可能以预定义的概率进入预订空间。此外,如果在到达时没有可用资源,切换调用可以选择在有限大小的队列中等待。在移动阶段,车辆在经典的完全共享策略下只服务新呼叫。在这两个阶段中,呼叫都是按照准随机过程到达系统的,在系统中接受它们需要一个带宽单元,并且具有指数分布的服务时间。为了分析各种性能指标,如时间拥塞概率、呼叫阻塞概率和链路利用率,提出了一种基于三维马尔可夫链的精确分析方法。
{"title":"Performance evaluation of a mobile hotspot supporting quasi-random traffic","authors":"Marinos Vlasakis,&nbsp;Ioannis Moscholios,&nbsp;Panagiotis Sarigiannidis,&nbsp;Michael Logothetis","doi":"10.1049/ntw2.12093","DOIUrl":"10.1049/ntw2.12093","url":null,"abstract":"<p>The authors study and evaluate a mobility-aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi-random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three-dimensional Markov chains.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46574287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal intelligent edge-servers placement in the healthcare field 医疗保健领域的最佳智能边缘服务器布局
IF 1.4 Q1 Mathematics Pub Date : 2023-07-09 DOI: 10.1049/ntw2.12097
Ahmed M. Jasim, Hamed Al-Raweshidy

The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.

提高医疗保健系统的效率是全世界各国的主要目标。然而,如何在控制成本的同时,为人们提供可扩展的可靠医疗保健服务,却是一个极具挑战性的问题。最有希望解决这一问题的方法是基于智能医疗(s-health)技术。此外,边缘计算与 s-health 的结合可以在延迟、带宽、功耗、安全性和隐私方面产生额外的好处。然而,边缘服务器的战略布局对于实现进一步的成本和延迟效益至关重要。本文分为两个部分:首先提出了一种基于人工智能的优先级机制来识别紧急案例,旨在提高服务质量和体验质量。然后,提出了一种优化边缘服务器放置(OESP)算法,以获得一种具有较低延迟和完整覆盖的高成本效益架构。结果表明,所提出的优先机制算法可以根据病人的数量和紧急程度减少病人的延迟,优先处理需求最大的病人。此外,OESP 算法成功地选择了部署边缘服务器的最佳地点,实现了具有成本效益的系统,改进幅度超过 80%。总之,文章介绍了一种改进的医疗系统,其性能值得称赞,成本效益更高,延迟更低。
{"title":"Optimal intelligent edge-servers placement in the healthcare field","authors":"Ahmed M. Jasim,&nbsp;Hamed Al-Raweshidy","doi":"10.1049/ntw2.12097","DOIUrl":"10.1049/ntw2.12097","url":null,"abstract":"<p>The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57810417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks 为零接触管理5G及其他网络部署云原生实验平台
IF 1.4 Q1 Mathematics Pub Date : 2023-07-08 DOI: 10.1049/ntw2.12095
Sergio Barrachina-Muñoz, Rasoul Nikbakht, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy, Panagiotis Kokkinos, Polyzois Soumplis, Aristotelis Kretsis, Emmanouel Varvarigos

An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.

提出了一个通过云原生部署和端到端监控管理5G及以上网络的实验框架。该框架在Kubernetes集群中使用容器化的网络功能,跨越云和边缘主机的多域网络。端到端监控通过Grafana仪表板进行演示,该仪表板在涉及UPF重新选择和用户移动性的两种情况下显示基础设施资源和无线电指标。作为第三种场景,作者展示了决策引擎如何与实验平台交互以执行零接触容器化应用程序迁移,强调了实现5G网络及其他网络动态和智能管理的潜力。
{"title":"Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks","authors":"Sergio Barrachina-Muñoz,&nbsp;Rasoul Nikbakht,&nbsp;Jorge Baranda,&nbsp;Miquel Payaró,&nbsp;Josep Mangues-Bafalluy,&nbsp;Panagiotis Kokkinos,&nbsp;Polyzois Soumplis,&nbsp;Aristotelis Kretsis,&nbsp;Emmanouel Varvarigos","doi":"10.1049/ntw2.12095","DOIUrl":"10.1049/ntw2.12095","url":null,"abstract":"<p>An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47441135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios 用于自组织路由场景的锚定自相似三维高斯马尔可夫移动模型
IF 1.4 Q1 Mathematics Pub Date : 2023-07-05 DOI: 10.1049/ntw2.12089
George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis

Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.

鉴于观察到的新型通信模式的发展和下一代蜂窝网络的建立,移动建模和自组织路由需求已经出现。飞行自组织网络是实现按需通信领域技术飞跃的关键支柱,特别是在紧急情况下;因此,采用应用程序和移动性感知路由是实现这一新兴用例集的一个很有希望的方法。本文研究了群体迁移模型和适用的路由协议,并进行了比较分析,从而引入了新的锚定自相似3D高斯-马尔可夫迁移模型(ASSGM-3D),该模型包含了一组新的时空统计指标。
{"title":"Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios","authors":"George Amponis,&nbsp;Thomas Lagkas,&nbsp;Vasileios Argyriou,&nbsp;Ioannis Moscholios,&nbsp;Maria Zevgara,&nbsp;Savvas Ouzounidis,&nbsp;Panagiotis Sarigiannidis","doi":"10.1049/ntw2.12089","DOIUrl":"10.1049/ntw2.12089","url":null,"abstract":"<p>Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49499420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise 广义高斯噪声下认知无线电的基于范数的频谱感知
IF 1.4 Q1 Mathematics Pub Date : 2023-06-28 DOI: 10.1049/ntw2.12092
Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R

Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on p-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.

认知无线电(CR)系统被配置为动态评估频谱利用率,并有助于提高频谱效率。因此,准确检测给定信道中的在位信号,通常被称为频谱感知(SS),对于CR至关重要。在SS领域,作者引入了一种新的基于接收节点观测值的p范数的拟合优度检验(GoFT)。为了捕捉实际通信信道中噪声分布的重尾性质,作者使用广义高斯分布(GGD)作为噪声模型。提出了一种新的p-范数检测器(PND)和几何功率检测器(GPD),并推导了相应的概率密度函数(PDF)。通过蒙特卡罗模拟,作者证明了导出的pdf与模拟结果的匹配。利用Neyman-Pearson框架,将PND和GPD与现有的微分熵检测器(DED)、众所周知的能量检测器(ED)和GGD噪声模型下的联合相关和能量检测器(CED)的性能进行了比较。利用蒙特卡罗模拟对所提出的PND和GPD进行了评估,结果表明其性能优越。此外,与现有技术相比,使用真实世界数据的实验建立了所提出的探测器的优越性。作者推导并实现了PND的优化阈值,进一步提高了性能。
{"title":"Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise","authors":"Arati Halaki,&nbsp;Sutapa Sarkar,&nbsp;Sanjeev Gurugopinath,&nbsp;Muralishankar R","doi":"10.1049/ntw2.12092","DOIUrl":"10.1049/ntw2.12092","url":null,"abstract":"<p>Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on <i>p</i>-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44089493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal resource optimisation based on multi-layer monitoring 基于多层监控的最优资源优化
IF 1.4 Q1 Mathematics Pub Date : 2023-06-27 DOI: 10.1049/ntw2.12090
Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou

The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.

在整个服务生命周期中,服务质量(QoS)水平的满意度是服务提供者(SP)的关键目标之一。为了以最佳方式实现这一点,需要预测所需物理和虚拟资源的确切数量,例如CPU和内存使用情况,以及影响系统工作负载的任何可能的参数组合,例如用户数、每个请求的持续时间等。为了解决这个问题,作者引入了一种新的架构及其开源实现,a)监控和收集来自异构资源的数据,b)使用它们来训练机器学习模型,c)为每个特定的服务类型定制它们。候选解决方案在两个实际服务中进行了验证,在预测大量操作配置所需资源方面显示出非常好的准确性,其中还应用了数据增强方法,以进一步将估计误差降低到32%。
{"title":"Optimal resource optimisation based on multi-layer monitoring","authors":"Dimitrios Uzunidis,&nbsp;Panagiotis Karkazis,&nbsp;Helen C. Leligou","doi":"10.1049/ntw2.12090","DOIUrl":"10.1049/ntw2.12090","url":null,"abstract":"<p>The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47856156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data security in smart devices: Advancement, constraints and future recommendations 智能设备中的数据安全:进展、限制和未来建议
IF 1.4 Q1 Mathematics Pub Date : 2023-06-21 DOI: 10.1049/ntw2.12091
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar

Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.

网络安全协议的实现是为了应对网络安全挑战。近年来,计算机网络和应用程序取得了长足的进步和发展,但消费者对网络技术和高科技设备的热情却因不断暴露于数据安全漏洞而受到抑制。到目前为止,由于担心数据安全泄漏的真实性、保密性和完整性,一些人拒绝使用智能设备。这不仅促使互联网服务供应商遵循市场保护机制,也要求软件开发商采用适当的安全协议来保护计算机网络安全。这些应用程序的可靠性和完整性不仅依赖于加密算法的有效性,还依赖于密钥管理协议。理解网络安全协议和实施高质量的标准来管理网络中的数据传输是保证网络安全的关键组成部分。本文主要在应用层探讨数据安全性,针对不同网络安全协议的各种攻击方法,并强调潜在的安全含义。该研究还着眼于相应的、实用的安全措施和未来对某些类型攻击的研究前景。最后,总结了在撰写本文时仍未解决的一些技术挑战,并讨论了网络安全的未来趋势。
{"title":"Data security in smart devices: Advancement, constraints and future recommendations","authors":"Zhang Wenhua,&nbsp;Mohammad Kamrul Hasan,&nbsp;Ahmad Fadzil Ismail,&nbsp;Zhang Yanke,&nbsp;Md Abdur Razzaque,&nbsp;Shayla Islam,&nbsp;Budati Anil kumar","doi":"10.1049/ntw2.12091","DOIUrl":"10.1049/ntw2.12091","url":null,"abstract":"<p>Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46701729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-device user authentication mechanism for Internet of Things 一种用于物联网的多设备用户认证机制
IF 1.4 Q1 Mathematics Pub Date : 2023-06-20 DOI: 10.1049/ntw2.12088
Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir

The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.

物联网(IoT)的出现使不同的定制服务能够通过利用低功耗传感设备的互联网连接获得的信息来缓解用户的日常生活活动。由于设备的多样性和参与设备的资源限制,物联网很容易受到安全攻击。因此,身份验证是在网络安全背景下使用物联网服务的基本措施。物联网设备的资源占用使得设计健壮和安全的身份验证机制具有挑战性。此外,现有的用户身份验证机制是在假设用户总是使用特定设备访问物联网环境的情况下设计的。然而,如今,大多数用户使用多个设备来访问互联网;随后,它需要一个身份验证机制来处理这种多样性。本文解决了这一限制,并提出了一种新的基于一次性密码(OTP)的用户身份验证方案,支持在物联网环境中从多个设备访问用户。我们使用广泛使用的BAN逻辑、AVISPA工具和非正式安全分析来验证所提出的方案,确保我们的方案保留了必要的安全特性。比较性能分析表明,我们的方案实现了与现有工作相当的计算、存储和通信成本。此外,仿真结果表明,该方法也保持了令人满意的网络性能。
{"title":"A multi-device user authentication mechanism for Internet of Things","authors":"Raihan Dewon Eman,&nbsp;Mosarrat Jahan,&nbsp;Upama Kabir","doi":"10.1049/ntw2.12088","DOIUrl":"https://doi.org/10.1049/ntw2.12088","url":null,"abstract":"<p>The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints 边缘和雾节点的放置方法、技术、参数和约束的综述
IF 1.4 Q1 Mathematics Pub Date : 2023-06-05 DOI: 10.1049/ntw2.12087
Samraa Adnan Al-Asadi, Safaa O. Al-Mamory

Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.

在边缘和雾计算中,边缘和雾节点必须最佳地位于网络边缘,以最大限度地减少网络的总体延迟。本调查解决了这些节点安置问题的所有方面。关于边缘和雾节点位置的文献是通过搜索查询从知名数据库(IEEE Xplore数字图书馆、Scopus、ScienceDirect和Web of Science)中收集的。使用关键词和滚雪球法进行人工搜索,以获得尽可能多的相关论文。根据定义的纳入标准,检索到的文档被过滤为64篇文章,为期8年(2015-2022)。根据使用的优化方法,文献可分为六类。第一种依赖于整数规划,占20.3%(13/64)。第二类依赖于启发式和元启发式方法,占20.3%(13/64)。第三类依赖于上述两类的混合方法,占18.7%(12/64)。第四类依赖于聚类方法,占11%(7/64)。第五类依赖于强化学习,占6.3%(4/64)。最后一类依赖于上述两种或两种以上方法的混合方法,占23.4%(15/64)。论文已被分析,以获得信息,如优化问题,用于解决它的方法,考虑参数,目标,约束,实施工具和评估方法。
{"title":"A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints","authors":"Samraa Adnan Al-Asadi,&nbsp;Safaa O. Al-Mamory","doi":"10.1049/ntw2.12087","DOIUrl":"10.1049/ntw2.12087","url":null,"abstract":"<p>Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49128988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1