首页 > 最新文献

IET Networks最新文献

英文 中文
Detection of Internet-wide traffic redirection attacks using machine learning techniques 使用机器学习技术检测互联网范围内的流量重定向攻击
IF 1.4 Q1 Mathematics Pub Date : 2023-05-27 DOI: 10.1049/ntw2.12085
Ana Subtil, M. Rosário Oliveira, Rui Valadas, Paulo Salvador, António Pacheco

Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.

互联网范围内的流量重定向攻击已经报道了很长时间,主要是由边界网关协议路由劫持引起的。这样的攻击是非常有害的,可以长时间地破坏对流行互联网站点的访问。这项工作解决了机器学习技术(无监督和有监督)的使用,利用探测器的分布式监控基础设施来测量被监视的互联网站点的往返时间。检测过程分为两个阶段:每个探针分类和单个探针决策的组合。我们的研究结果表明,由于其性能和对不同攻击类型的适应性,最好的策略是使用基于Tukey方法的无监督技术进行分类,并使用隐马尔可夫模型进行组合。
{"title":"Detection of Internet-wide traffic redirection attacks using machine learning techniques","authors":"Ana Subtil,&nbsp;M. Rosário Oliveira,&nbsp;Rui Valadas,&nbsp;Paulo Salvador,&nbsp;António Pacheco","doi":"10.1049/ntw2.12085","DOIUrl":"10.1049/ntw2.12085","url":null,"abstract":"<p>Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48303880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Blockchain and decentralised solutions for social good 客座编辑:区块链和去中心化的社会公益解决方案
IF 1.4 Q1 Mathematics Pub Date : 2023-05-19 DOI: 10.1049/ntw2.12086
Barbara Guidi, Ombretta Gaggi, Andrea Michienzi

Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.

The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.

A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.

This Special Issue is composed of four peer-reviewed papers of excellent quality.

Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.

Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks

为了满足隐私约束,使用RGB(红、绿、蓝)颜色分解原理对图像进行加密和解密。加密图像存储在IPFS上,确保高可用性,并使用区块链存储IPFS内容标识符。此模式以分布式方式确保数据隐私和不变性。仿真结果表明,该方案在保持无损加密的同时,在安全性方面具有较高的有效性。本期特刊选择的所有论文都表明了应用区块链和去中心化解决方案对社会公益的重要性。由于无数的应用场景,以及对互联网服务民主化和去中心化的不断需求,区块链和去中心化技术在未来几年仍将是新技术的灵感来源。
{"title":"Guest Editorial: Blockchain and decentralised solutions for social good","authors":"Barbara Guidi,&nbsp;Ombretta Gaggi,&nbsp;Andrea Michienzi","doi":"10.1049/ntw2.12086","DOIUrl":"10.1049/ntw2.12086","url":null,"abstract":"<p>Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.</p><p>The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.</p><p>A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.</p><p>This Special Issue is composed of four peer-reviewed papers of excellent quality.</p><p>Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.</p><p>Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43102231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm 基于高效上行链路非正交多址5G通信的联合功率控制和用户分组机制:利用Lèvy-flight firefly算法
IF 1.4 Q1 Mathematics Pub Date : 2023-03-23 DOI: 10.1049/ntw2.12084
Z. Albataineh, Khaled F. Hayajneh, Haythem A. Bany Salameh, Raed Al Al Athamneh, Y. Jararweh
{"title":"Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm","authors":"Z. Albataineh, Khaled F. Hayajneh, Haythem A. Bany Salameh, Raed Al Al Athamneh, Y. Jararweh","doi":"10.1049/ntw2.12084","DOIUrl":"https://doi.org/10.1049/ntw2.12084","url":null,"abstract":"","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45122380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CORRIGENDUM: Predicting household water use behaviour for improved hygiene practices in internet of things environment via dynamic behaviour intervention model CORRIGENDUM:通过动态行为干预模型预测物联网环境中改善卫生习惯的家庭用水行为
IF 1.4 Q1 Mathematics Pub Date : 2023-03-23 DOI: 10.1049/ntw2.12083

Below content is reversed to correct an error of citation in our original publication in journal IET Networks [1].

On page 147, Figure 3 title is to be replaced as ‘Fig 3. ETPB model path analyses [2] and variable definition’.

On page 146, Section 3.3, the sentence ‘As classical SEM model only represents a static system and cannot express behaviour change over time, to expand the ETPB SEM model with dynamic effects, we proposed a fluid analogy to postulate and parallel inventory management in supply chains’ has to be replaced as ‘As classical SEM model only represents a static system and cannot express behaviour change over time, to expand the ETPB SEM model with dynamic effects, we utilised a fluid analogy [2] to postulate and parallel inventory management in supply chains’.

以下内容被颠倒,以更正我们在《IET网络》杂志[1]上发表的原始出版物中的引用错误。在第147页,图3的标题被替换为“图3”。ETPB模型路径分析[2]和变量定义。在第146页第3.3节,“由于经典SEM模型仅代表静态系统,不能表达随时间的行为变化,因此扩展了具有动态效应的ETPB SEM模型,我们提出了一个流体类比来假设供应链中的并行库存管理,必须将其替换为“由于经典的SEM模型只代表一个静态系统,不能表达随时间的行为变化,为了扩展具有动态效应的ETPB SEM模型,我们使用了流体类比[2]来假设和并行库存管理供应链”。
{"title":"CORRIGENDUM: Predicting household water use behaviour for improved hygiene practices in internet of things environment via dynamic behaviour intervention model","authors":"","doi":"10.1049/ntw2.12083","DOIUrl":"https://doi.org/10.1049/ntw2.12083","url":null,"abstract":"<p>Below content is reversed to correct an error of citation in our original publication in journal IET Networks [<span>1</span>].</p><p>On page 147, Figure 3 title is to be replaced as ‘Fig 3. ETPB model path analyses [<span>2</span>] and variable definition’.</p><p>On page 146, Section 3.3, the sentence ‘As classical SEM model only represents a static system and cannot express behaviour change over time, to expand the ETPB SEM model with dynamic effects, we proposed a fluid analogy to postulate and parallel inventory management in supply chains’ has to be replaced as ‘As classical SEM model only represents a static system and cannot express behaviour change over time, to expand the ETPB SEM model with dynamic effects, we utilised a fluid analogy [<span>2</span>] to postulate and parallel inventory management in supply chains’.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50153702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new clustering-based optimised energy approach for fog-enabled IoT networks 一种新的基于集群的优化能源方法,用于支持雾的物联网网络
IF 1.4 Q1 Mathematics Pub Date : 2023-03-03 DOI: 10.1049/ntw2.12082
Salah Eddine Essalhi, Mohammed Raiss El Fenni, Houda Chafnaji

The Internet of Things (IoT) has induced many advances in the modern world, thus always arousing great interest from the scientific community. Due to a large number of connected devices, this paradigm has put into circulation an enormous data quantity to be processed and offloaded while respecting latency and energy constraints that Central Cloud alone cannot meet. Hence, Fog Computing has come to fill these gaps by providing computing, management, and storage resources via small-distributed data centres located at the network edge. The majority of previous research on centralised clustering in an IoT environment did not consider both residual energy and the location of the IoT devices, as well as the signalling communication frequency, to solve an issue of extreme energy consumption during data exchange between IoT devices and Fog entities. Thus, the objective of this study is to find solutions taking into account these criteria to guarantee the Fog system's energy efficiency while coping with the energy consumption increase related to the handling of massive data volume. Indeed, the proposed study presents a novel approach based on Fog-IoT architecture to ensure intelligent energy management during communication and offloaded task processing in IoT applications. The simulation results show its effectiveness.

物联网(IoT)在现代世界引发了许多进步,因此一直引起科学界的极大兴趣。由于连接的设备数量庞大,这种模式投入了大量的数据量,需要处理和卸载,同时又尊重了中央云无法单独满足的延迟和能量限制。因此,雾计算通过位于网络边缘的小型分布式数据中心提供计算、管理和存储资源来填补这些空白。之前关于物联网环境中集中式聚类的大多数研究都没有考虑剩余能量和物联网设备的位置以及信号通信频率,以解决物联网设备与雾实体之间数据交换过程中极端能耗的问题。因此,本研究的目的是找到考虑这些标准的解决方案,以保证雾系统的能源效率,同时应对与处理大量数据量相关的能源消耗增加。事实上,该研究提出了一种基于Fog-IoT架构的新方法,以确保物联网应用中通信和卸载任务处理期间的智能能源管理。仿真结果表明了该方法的有效性。
{"title":"A new clustering-based optimised energy approach for fog-enabled IoT networks","authors":"Salah Eddine Essalhi,&nbsp;Mohammed Raiss El Fenni,&nbsp;Houda Chafnaji","doi":"10.1049/ntw2.12082","DOIUrl":"10.1049/ntw2.12082","url":null,"abstract":"<p>The Internet of Things (IoT) has induced many advances in the modern world, thus always arousing great interest from the scientific community. Due to a large number of connected devices, this paradigm has put into circulation an enormous data quantity to be processed and offloaded while respecting latency and energy constraints that Central Cloud alone cannot meet. Hence, Fog Computing has come to fill these gaps by providing computing, management, and storage resources via small-distributed data centres located at the network edge. The majority of previous research on centralised clustering in an IoT environment did not consider both residual energy and the location of the IoT devices, as well as the signalling communication frequency, to solve an issue of extreme energy consumption during data exchange between IoT devices and Fog entities. Thus, the objective of this study is to find solutions taking into account these criteria to guarantee the Fog system's energy efficiency while coping with the energy consumption increase related to the handling of massive data volume. Indeed, the proposed study presents a novel approach based on Fog-IoT architecture to ensure intelligent energy management during communication and offloaded task processing in IoT applications. The simulation results show its effectiveness.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12082","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45602216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HPIM-DM: A fast and reliable dense-mode multicast routing protocol HPIM-DM:一种快速、可靠的密集模式组播路由协议
IF 1.4 Q1 Mathematics Pub Date : 2023-01-04 DOI: 10.1049/ntw2.12081
Pedro Oliveira, Alexandre Silva, Rui Valadas

The Hard-state Protocol Independent Multicast—Dense Mode (HPIM-DM) multicast routing protocol is proposed. HPIM-DM is a hard-state version of PIM-DM that overcomes its poor convergence times and lack of resilience to replay attacks. Like PIM-DM, HPIM-DM is meant for dense networks and supports its operation on a unicast routing protocol and reverse path forwarding. However, routers maintain sense of the multicast trees at all times, allowing fast reconfiguration in the presence of network failures or unicast route changes. This is achieved by (i) keeping information on all upstream neighbours from which multicast data can be received, (ii) ensuring the reliable transmission and sequencing of control messages, and (iii) synchronizing the routing information immediately when a new router joins the network. The correctness of the protocol was extensively validated using model checking and logical reasoning. The protocol was fully implemented in Python, and the implementation is publicly available. Finally, we show both theoretically and experimentally that HPIM-DM has much better convergence times than PIM-DM.

提出了一种独立于硬状态协议的多播密集模式(HPIM-DM)组播路由协议。HPIM-DM是PIM-DM的硬状态版本,克服了其较差的收敛时间和对重放攻击缺乏弹性的缺点。与PIM-DM一样,HPIM-DM适用于密集网络,支持单播路由协议和反向路径转发。然而,路由器始终保持对多播树的感知,允许在网络故障或单播路由变化的情况下快速重新配置。这是通过以下方式实现的:(i)保存所有上游邻居的信息,从这些上游邻居可以接收到多播数据;(ii)确保控制消息的可靠传输和排序;(iii)在新路由器加入网络时立即同步路由信息。使用模型检查和逻辑推理对协议的正确性进行了广泛验证。该协议在Python中完全实现,并且实现是公开的。最后,从理论和实验两方面证明了HPIM-DM比PIM-DM具有更好的收敛时间。
{"title":"HPIM-DM: A fast and reliable dense-mode multicast routing protocol","authors":"Pedro Oliveira,&nbsp;Alexandre Silva,&nbsp;Rui Valadas","doi":"10.1049/ntw2.12081","DOIUrl":"10.1049/ntw2.12081","url":null,"abstract":"<p>The Hard-state Protocol Independent Multicast—Dense Mode (HPIM-DM) multicast routing protocol is proposed. HPIM-DM is a hard-state version of PIM-DM that overcomes its poor convergence times and lack of resilience to replay attacks. Like PIM-DM, HPIM-DM is meant for dense networks and supports its operation on a unicast routing protocol and reverse path forwarding. However, routers maintain sense of the multicast trees at all times, allowing fast reconfiguration in the presence of network failures or unicast route changes. This is achieved by (i) keeping information on all upstream neighbours from which multicast data can be received, (ii) ensuring the reliable transmission and sequencing of control messages, and (iii) synchronizing the routing information immediately when a new router joins the network. The correctness of the protocol was extensively validated using model checking and logical reasoning. The protocol was fully implemented in Python, and the implementation is publicly available. Finally, we show both theoretically and experimentally that HPIM-DM has much better convergence times than PIM-DM.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46611372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PharmaChain: A blockchain to ensure counterfeit-free pharmaceutical supply chain PharmaChain:确保无假冒药品供应链的区块链
IF 1.4 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.1049/ntw2.12041
Anand K. Bapatla, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal, Anusha Bapatla
{"title":"PharmaChain: A blockchain to ensure counterfeit-free pharmaceutical supply chain","authors":"Anand K. Bapatla,&nbsp;Saraju P. Mohanty,&nbsp;Elias Kougianos,&nbsp;Deepak Puthal,&nbsp;Anusha Bapatla","doi":"10.1049/ntw2.12041","DOIUrl":"https://doi.org/10.1049/ntw2.12041","url":null,"abstract":"","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50121869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Usability of a gamified antibiotic resistance awareness mobile application: A qualitative evaluation 游戏化抗生素耐药性意识移动应用程序的可用性:定性评估
IF 1.4 Q1 Mathematics Pub Date : 2022-12-17 DOI: 10.1049/ntw2.12075
U. Mohamad, Intan Nadiah Abdul Hakim, Mahdi Ali‐Akbari
{"title":"Usability of a gamified antibiotic resistance awareness mobile application: A qualitative evaluation","authors":"U. Mohamad, Intan Nadiah Abdul Hakim, Mahdi Ali‐Akbari","doi":"10.1049/ntw2.12075","DOIUrl":"https://doi.org/10.1049/ntw2.12075","url":null,"abstract":"","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49035342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource allocation for Vehicle-to-Everything communications: A survey 车对物通信的资源分配:一项调查
IF 1.4 Q1 Mathematics Pub Date : 2022-12-08 DOI: 10.1049/ntw2.12078
Ibtissem Brahmi, Hend Koubaa, Faouzi Zarai

The Deployment of new techniques to accommodate high data throughput, significant reliability, and quality of service (QoS) delivery prompts the use of 4G and 5G networks in several applications. In these networks, Vehicle-to-Everything (V2X) communications authorised by device-to-device cellular links (D2D) have gained momentum because of their potential to improve road safety, efficiency, and convenience. This improvement is to be provided by different types of V2X communications, including Vehicle-to-Pedestrian (V2P), Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Network (V2N) communications. However, considering several limiting factors such as mobility and increasing number of vehicles, efficiency of using wireless resources is a challenging task. Indeed, different research works on V2X radio resource allocation have been studied and evaluated with respect to several criteria. In this study, a survey of recent works but in a different way synthesising radio resource allocation methods is presented. Resource allocation classification into different categories is proposed. This classification is related to three main factors. The first takes into account the selection mode factor. It highlights the use of different approaches in each of the centralised, distributed, and mixed modes. The second one takes into account the considered performance criteria, including capacity, priority, delay etc. The last one focuses on the methods and scenarios used to evaluate a resource allocation approach.

部署新技术以适应高数据吞吐量、高可靠性和服务质量(QoS)交付,促使4G和5G网络在多个应用中得到使用。在这些网络中,由设备对设备蜂窝链路(D2D)授权的车对一切(V2X)通信因其提高道路安全性、效率和便利性的潜力而获得了发展势头。这种改进将通过不同类型的V2X通信来实现,包括车对行人(V2P)、车对车(V2V)、车对基础设施(V2I)和车对网络(V2N)通信。然而,考虑到移动性和车辆数量的增加等限制因素,无线资源的使用效率是一项具有挑战性的任务。事实上,关于V2X无线电资源分配的不同研究工作已经根据几个标准进行了研究和评估。在这项研究中,对最近的工作进行了调查,但以不同的方式综合了无线电资源分配方法。提出了资源分配的分类方法。这种分类与三个主要因素有关。第一个考虑了选择模式因素。它强调了在集中式、分布式和混合模式中使用不同的方法。第二种方法考虑考虑的性能标准,包括容量、优先级、延迟等。最后一个重点是用于评估资源分配方法的方法和场景。
{"title":"Resource allocation for Vehicle-to-Everything communications: A survey","authors":"Ibtissem Brahmi,&nbsp;Hend Koubaa,&nbsp;Faouzi Zarai","doi":"10.1049/ntw2.12078","DOIUrl":"10.1049/ntw2.12078","url":null,"abstract":"<p>The Deployment of new techniques to accommodate high data throughput, significant reliability, and quality of service (QoS) delivery prompts the use of 4G and 5G networks in several applications. In these networks, Vehicle-to-Everything (V2X) communications authorised by device-to-device cellular links (D2D) have gained momentum because of their potential to improve road safety, efficiency, and convenience. This improvement is to be provided by different types of V2X communications, including Vehicle-to-Pedestrian (V2P), Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Network (V2N) communications. However, considering several limiting factors such as mobility and increasing number of vehicles, efficiency of using wireless resources is a challenging task. Indeed, different research works on V2X radio resource allocation have been studied and evaluated with respect to several criteria. In this study, a survey of recent works but in a different way synthesising radio resource allocation methods is presented. Resource allocation classification into different categories is proposed. This classification is related to three main factors. The first takes into account the selection mode factor. It highlights the use of different approaches in each of the centralised, distributed, and mixed modes. The second one takes into account the considered performance criteria, including capacity, priority, delay etc. The last one focuses on the methods and scenarios used to evaluate a resource allocation approach.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12078","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45046703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method 产品创新设计方法中的大数据技术融合反向传播神经网络
IF 1.4 Q1 Mathematics Pub Date : 2022-12-05 DOI: 10.1049/ntw2.12073
Ren-fa Li, Qian Zeng
{"title":"Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method","authors":"Ren-fa Li, Qian Zeng","doi":"10.1049/ntw2.12073","DOIUrl":"https://doi.org/10.1049/ntw2.12073","url":null,"abstract":"","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41549323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1