The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.
{"title":"Optimal intelligent edge-servers placement in the healthcare field","authors":"Ahmed M. Jasim, Hamed Al-Raweshidy","doi":"10.1049/ntw2.12097","DOIUrl":"10.1049/ntw2.12097","url":null,"abstract":"<p>The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"13-27"},"PeriodicalIF":1.4,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57810417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.
{"title":"Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks","authors":"Sergio Barrachina-Muñoz, Rasoul Nikbakht, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy, Panagiotis Kokkinos, Polyzois Soumplis, Aristotelis Kretsis, Emmanouel Varvarigos","doi":"10.1049/ntw2.12095","DOIUrl":"10.1049/ntw2.12095","url":null,"abstract":"<p>An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"305-315"},"PeriodicalIF":1.4,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47441135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis
Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.
{"title":"Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios","authors":"George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis","doi":"10.1049/ntw2.12089","DOIUrl":"10.1049/ntw2.12089","url":null,"abstract":"<p>Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"250-259"},"PeriodicalIF":1.4,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49499420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R
Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on p-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.
{"title":"Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise","authors":"Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R","doi":"10.1049/ntw2.12092","DOIUrl":"10.1049/ntw2.12092","url":null,"abstract":"<p>Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on <i>p</i>-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"282-294"},"PeriodicalIF":1.4,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44089493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou
The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.
{"title":"Optimal resource optimisation based on multi-layer monitoring","authors":"Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou","doi":"10.1049/ntw2.12090","DOIUrl":"10.1049/ntw2.12090","url":null,"abstract":"<p>The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"260-267"},"PeriodicalIF":1.4,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47856156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar
Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.
{"title":"Data security in smart devices: Advancement, constraints and future recommendations","authors":"Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar","doi":"10.1049/ntw2.12091","DOIUrl":"10.1049/ntw2.12091","url":null,"abstract":"<p>Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"269-281"},"PeriodicalIF":1.4,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46701729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.
{"title":"A multi-device user authentication mechanism for Internet of Things","authors":"Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir","doi":"10.1049/ntw2.12088","DOIUrl":"https://doi.org/10.1049/ntw2.12088","url":null,"abstract":"<p>The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"229-249"},"PeriodicalIF":1.4,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.
在边缘和雾计算中,边缘和雾节点必须最佳地位于网络边缘,以最大限度地减少网络的总体延迟。本调查解决了这些节点安置问题的所有方面。关于边缘和雾节点位置的文献是通过搜索查询从知名数据库(IEEE Xplore数字图书馆、Scopus、ScienceDirect和Web of Science)中收集的。使用关键词和滚雪球法进行人工搜索,以获得尽可能多的相关论文。根据定义的纳入标准,检索到的文档被过滤为64篇文章,为期8年(2015-2022)。根据使用的优化方法,文献可分为六类。第一种依赖于整数规划,占20.3%(13/64)。第二类依赖于启发式和元启发式方法,占20.3%(13/64)。第三类依赖于上述两类的混合方法,占18.7%(12/64)。第四类依赖于聚类方法,占11%(7/64)。第五类依赖于强化学习,占6.3%(4/64)。最后一类依赖于上述两种或两种以上方法的混合方法,占23.4%(15/64)。论文已被分析,以获得信息,如优化问题,用于解决它的方法,考虑参数,目标,约束,实施工具和评估方法。
{"title":"A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints","authors":"Samraa Adnan Al-Asadi, Safaa O. Al-Mamory","doi":"10.1049/ntw2.12087","DOIUrl":"10.1049/ntw2.12087","url":null,"abstract":"<p>Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"197-228"},"PeriodicalIF":1.4,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49128988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ana Subtil, M. Rosário Oliveira, Rui Valadas, Paulo Salvador, António Pacheco
Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.
{"title":"Detection of Internet-wide traffic redirection attacks using machine learning techniques","authors":"Ana Subtil, M. Rosário Oliveira, Rui Valadas, Paulo Salvador, António Pacheco","doi":"10.1049/ntw2.12085","DOIUrl":"10.1049/ntw2.12085","url":null,"abstract":"<p>Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 4","pages":"179-195"},"PeriodicalIF":1.4,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48303880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
<p>Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.</p><p>The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.</p><p>A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.</p><p>This Special Issue is composed of four peer-reviewed papers of excellent quality.</p><p>Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.</p><p>Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks
{"title":"Guest Editorial: Blockchain and decentralised solutions for social good","authors":"Barbara Guidi, Ombretta Gaggi, Andrea Michienzi","doi":"10.1049/ntw2.12086","DOIUrl":"10.1049/ntw2.12086","url":null,"abstract":"<p>Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.</p><p>The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.</p><p>A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.</p><p>This Special Issue is composed of four peer-reviewed papers of excellent quality.</p><p>Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.</p><p>Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 4","pages":"153-154"},"PeriodicalIF":1.4,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43102231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}