首页 > 最新文献

IET Networks最新文献

英文 中文
Optimal intelligent edge-servers placement in the healthcare field 医疗保健领域的最佳智能边缘服务器布局
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-09 DOI: 10.1049/ntw2.12097
Ahmed M. Jasim, Hamed Al-Raweshidy

The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.

提高医疗保健系统的效率是全世界各国的主要目标。然而,如何在控制成本的同时,为人们提供可扩展的可靠医疗保健服务,却是一个极具挑战性的问题。最有希望解决这一问题的方法是基于智能医疗(s-health)技术。此外,边缘计算与 s-health 的结合可以在延迟、带宽、功耗、安全性和隐私方面产生额外的好处。然而,边缘服务器的战略布局对于实现进一步的成本和延迟效益至关重要。本文分为两个部分:首先提出了一种基于人工智能的优先级机制来识别紧急案例,旨在提高服务质量和体验质量。然后,提出了一种优化边缘服务器放置(OESP)算法,以获得一种具有较低延迟和完整覆盖的高成本效益架构。结果表明,所提出的优先机制算法可以根据病人的数量和紧急程度减少病人的延迟,优先处理需求最大的病人。此外,OESP 算法成功地选择了部署边缘服务器的最佳地点,实现了具有成本效益的系统,改进幅度超过 80%。总之,文章介绍了一种改进的医疗系统,其性能值得称赞,成本效益更高,延迟更低。
{"title":"Optimal intelligent edge-servers placement in the healthcare field","authors":"Ahmed M. Jasim,&nbsp;Hamed Al-Raweshidy","doi":"10.1049/ntw2.12097","DOIUrl":"10.1049/ntw2.12097","url":null,"abstract":"<p>The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"13-27"},"PeriodicalIF":1.4,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57810417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks 为零接触管理5G及其他网络部署云原生实验平台
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-08 DOI: 10.1049/ntw2.12095
Sergio Barrachina-Muñoz, Rasoul Nikbakht, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy, Panagiotis Kokkinos, Polyzois Soumplis, Aristotelis Kretsis, Emmanouel Varvarigos

An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.

提出了一个通过云原生部署和端到端监控管理5G及以上网络的实验框架。该框架在Kubernetes集群中使用容器化的网络功能,跨越云和边缘主机的多域网络。端到端监控通过Grafana仪表板进行演示,该仪表板在涉及UPF重新选择和用户移动性的两种情况下显示基础设施资源和无线电指标。作为第三种场景,作者展示了决策引擎如何与实验平台交互以执行零接触容器化应用程序迁移,强调了实现5G网络及其他网络动态和智能管理的潜力。
{"title":"Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks","authors":"Sergio Barrachina-Muñoz,&nbsp;Rasoul Nikbakht,&nbsp;Jorge Baranda,&nbsp;Miquel Payaró,&nbsp;Josep Mangues-Bafalluy,&nbsp;Panagiotis Kokkinos,&nbsp;Polyzois Soumplis,&nbsp;Aristotelis Kretsis,&nbsp;Emmanouel Varvarigos","doi":"10.1049/ntw2.12095","DOIUrl":"10.1049/ntw2.12095","url":null,"abstract":"<p>An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"305-315"},"PeriodicalIF":1.4,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47441135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios 用于自组织路由场景的锚定自相似三维高斯马尔可夫移动模型
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-05 DOI: 10.1049/ntw2.12089
George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis

Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.

鉴于观察到的新型通信模式的发展和下一代蜂窝网络的建立,移动建模和自组织路由需求已经出现。飞行自组织网络是实现按需通信领域技术飞跃的关键支柱,特别是在紧急情况下;因此,采用应用程序和移动性感知路由是实现这一新兴用例集的一个很有希望的方法。本文研究了群体迁移模型和适用的路由协议,并进行了比较分析,从而引入了新的锚定自相似3D高斯-马尔可夫迁移模型(ASSGM-3D),该模型包含了一组新的时空统计指标。
{"title":"Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios","authors":"George Amponis,&nbsp;Thomas Lagkas,&nbsp;Vasileios Argyriou,&nbsp;Ioannis Moscholios,&nbsp;Maria Zevgara,&nbsp;Savvas Ouzounidis,&nbsp;Panagiotis Sarigiannidis","doi":"10.1049/ntw2.12089","DOIUrl":"10.1049/ntw2.12089","url":null,"abstract":"<p>Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"250-259"},"PeriodicalIF":1.4,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49499420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise 广义高斯噪声下认知无线电的基于范数的频谱感知
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-28 DOI: 10.1049/ntw2.12092
Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R

Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on p-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.

认知无线电(CR)系统被配置为动态评估频谱利用率,并有助于提高频谱效率。因此,准确检测给定信道中的在位信号,通常被称为频谱感知(SS),对于CR至关重要。在SS领域,作者引入了一种新的基于接收节点观测值的p范数的拟合优度检验(GoFT)。为了捕捉实际通信信道中噪声分布的重尾性质,作者使用广义高斯分布(GGD)作为噪声模型。提出了一种新的p-范数检测器(PND)和几何功率检测器(GPD),并推导了相应的概率密度函数(PDF)。通过蒙特卡罗模拟,作者证明了导出的pdf与模拟结果的匹配。利用Neyman-Pearson框架,将PND和GPD与现有的微分熵检测器(DED)、众所周知的能量检测器(ED)和GGD噪声模型下的联合相关和能量检测器(CED)的性能进行了比较。利用蒙特卡罗模拟对所提出的PND和GPD进行了评估,结果表明其性能优越。此外,与现有技术相比,使用真实世界数据的实验建立了所提出的探测器的优越性。作者推导并实现了PND的优化阈值,进一步提高了性能。
{"title":"Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise","authors":"Arati Halaki,&nbsp;Sutapa Sarkar,&nbsp;Sanjeev Gurugopinath,&nbsp;Muralishankar R","doi":"10.1049/ntw2.12092","DOIUrl":"10.1049/ntw2.12092","url":null,"abstract":"<p>Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on <i>p</i>-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"282-294"},"PeriodicalIF":1.4,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44089493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal resource optimisation based on multi-layer monitoring 基于多层监控的最优资源优化
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-27 DOI: 10.1049/ntw2.12090
Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou

The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.

在整个服务生命周期中,服务质量(QoS)水平的满意度是服务提供者(SP)的关键目标之一。为了以最佳方式实现这一点,需要预测所需物理和虚拟资源的确切数量,例如CPU和内存使用情况,以及影响系统工作负载的任何可能的参数组合,例如用户数、每个请求的持续时间等。为了解决这个问题,作者引入了一种新的架构及其开源实现,a)监控和收集来自异构资源的数据,b)使用它们来训练机器学习模型,c)为每个特定的服务类型定制它们。候选解决方案在两个实际服务中进行了验证,在预测大量操作配置所需资源方面显示出非常好的准确性,其中还应用了数据增强方法,以进一步将估计误差降低到32%。
{"title":"Optimal resource optimisation based on multi-layer monitoring","authors":"Dimitrios Uzunidis,&nbsp;Panagiotis Karkazis,&nbsp;Helen C. Leligou","doi":"10.1049/ntw2.12090","DOIUrl":"10.1049/ntw2.12090","url":null,"abstract":"<p>The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"260-267"},"PeriodicalIF":1.4,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47856156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data security in smart devices: Advancement, constraints and future recommendations 智能设备中的数据安全:进展、限制和未来建议
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-21 DOI: 10.1049/ntw2.12091
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar

Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.

网络安全协议的实现是为了应对网络安全挑战。近年来,计算机网络和应用程序取得了长足的进步和发展,但消费者对网络技术和高科技设备的热情却因不断暴露于数据安全漏洞而受到抑制。到目前为止,由于担心数据安全泄漏的真实性、保密性和完整性,一些人拒绝使用智能设备。这不仅促使互联网服务供应商遵循市场保护机制,也要求软件开发商采用适当的安全协议来保护计算机网络安全。这些应用程序的可靠性和完整性不仅依赖于加密算法的有效性,还依赖于密钥管理协议。理解网络安全协议和实施高质量的标准来管理网络中的数据传输是保证网络安全的关键组成部分。本文主要在应用层探讨数据安全性,针对不同网络安全协议的各种攻击方法,并强调潜在的安全含义。该研究还着眼于相应的、实用的安全措施和未来对某些类型攻击的研究前景。最后,总结了在撰写本文时仍未解决的一些技术挑战,并讨论了网络安全的未来趋势。
{"title":"Data security in smart devices: Advancement, constraints and future recommendations","authors":"Zhang Wenhua,&nbsp;Mohammad Kamrul Hasan,&nbsp;Ahmad Fadzil Ismail,&nbsp;Zhang Yanke,&nbsp;Md Abdur Razzaque,&nbsp;Shayla Islam,&nbsp;Budati Anil kumar","doi":"10.1049/ntw2.12091","DOIUrl":"10.1049/ntw2.12091","url":null,"abstract":"<p>Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"269-281"},"PeriodicalIF":1.4,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46701729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-device user authentication mechanism for Internet of Things 一种用于物联网的多设备用户认证机制
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-20 DOI: 10.1049/ntw2.12088
Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir

The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.

物联网(IoT)的出现使不同的定制服务能够通过利用低功耗传感设备的互联网连接获得的信息来缓解用户的日常生活活动。由于设备的多样性和参与设备的资源限制,物联网很容易受到安全攻击。因此,身份验证是在网络安全背景下使用物联网服务的基本措施。物联网设备的资源占用使得设计健壮和安全的身份验证机制具有挑战性。此外,现有的用户身份验证机制是在假设用户总是使用特定设备访问物联网环境的情况下设计的。然而,如今,大多数用户使用多个设备来访问互联网;随后,它需要一个身份验证机制来处理这种多样性。本文解决了这一限制,并提出了一种新的基于一次性密码(OTP)的用户身份验证方案,支持在物联网环境中从多个设备访问用户。我们使用广泛使用的BAN逻辑、AVISPA工具和非正式安全分析来验证所提出的方案,确保我们的方案保留了必要的安全特性。比较性能分析表明,我们的方案实现了与现有工作相当的计算、存储和通信成本。此外,仿真结果表明,该方法也保持了令人满意的网络性能。
{"title":"A multi-device user authentication mechanism for Internet of Things","authors":"Raihan Dewon Eman,&nbsp;Mosarrat Jahan,&nbsp;Upama Kabir","doi":"10.1049/ntw2.12088","DOIUrl":"https://doi.org/10.1049/ntw2.12088","url":null,"abstract":"<p>The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"229-249"},"PeriodicalIF":1.4,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints 边缘和雾节点的放置方法、技术、参数和约束的综述
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-05 DOI: 10.1049/ntw2.12087
Samraa Adnan Al-Asadi, Safaa O. Al-Mamory

Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.

在边缘和雾计算中,边缘和雾节点必须最佳地位于网络边缘,以最大限度地减少网络的总体延迟。本调查解决了这些节点安置问题的所有方面。关于边缘和雾节点位置的文献是通过搜索查询从知名数据库(IEEE Xplore数字图书馆、Scopus、ScienceDirect和Web of Science)中收集的。使用关键词和滚雪球法进行人工搜索,以获得尽可能多的相关论文。根据定义的纳入标准,检索到的文档被过滤为64篇文章,为期8年(2015-2022)。根据使用的优化方法,文献可分为六类。第一种依赖于整数规划,占20.3%(13/64)。第二类依赖于启发式和元启发式方法,占20.3%(13/64)。第三类依赖于上述两类的混合方法,占18.7%(12/64)。第四类依赖于聚类方法,占11%(7/64)。第五类依赖于强化学习,占6.3%(4/64)。最后一类依赖于上述两种或两种以上方法的混合方法,占23.4%(15/64)。论文已被分析,以获得信息,如优化问题,用于解决它的方法,考虑参数,目标,约束,实施工具和评估方法。
{"title":"A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints","authors":"Samraa Adnan Al-Asadi,&nbsp;Safaa O. Al-Mamory","doi":"10.1049/ntw2.12087","DOIUrl":"10.1049/ntw2.12087","url":null,"abstract":"<p>Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"197-228"},"PeriodicalIF":1.4,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49128988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Internet-wide traffic redirection attacks using machine learning techniques 使用机器学习技术检测互联网范围内的流量重定向攻击
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-27 DOI: 10.1049/ntw2.12085
Ana Subtil, M. Rosário Oliveira, Rui Valadas, Paulo Salvador, António Pacheco

Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.

互联网范围内的流量重定向攻击已经报道了很长时间,主要是由边界网关协议路由劫持引起的。这样的攻击是非常有害的,可以长时间地破坏对流行互联网站点的访问。这项工作解决了机器学习技术(无监督和有监督)的使用,利用探测器的分布式监控基础设施来测量被监视的互联网站点的往返时间。检测过程分为两个阶段:每个探针分类和单个探针决策的组合。我们的研究结果表明,由于其性能和对不同攻击类型的适应性,最好的策略是使用基于Tukey方法的无监督技术进行分类,并使用隐马尔可夫模型进行组合。
{"title":"Detection of Internet-wide traffic redirection attacks using machine learning techniques","authors":"Ana Subtil,&nbsp;M. Rosário Oliveira,&nbsp;Rui Valadas,&nbsp;Paulo Salvador,&nbsp;António Pacheco","doi":"10.1049/ntw2.12085","DOIUrl":"10.1049/ntw2.12085","url":null,"abstract":"<p>Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 4","pages":"179-195"},"PeriodicalIF":1.4,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48303880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: Blockchain and decentralised solutions for social good 客座编辑:区块链和去中心化的社会公益解决方案
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-19 DOI: 10.1049/ntw2.12086
Barbara Guidi, Ombretta Gaggi, Andrea Michienzi
<p>Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.</p><p>The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.</p><p>A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.</p><p>This Special Issue is composed of four peer-reviewed papers of excellent quality.</p><p>Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.</p><p>Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks
为了满足隐私约束,使用RGB(红、绿、蓝)颜色分解原理对图像进行加密和解密。加密图像存储在IPFS上,确保高可用性,并使用区块链存储IPFS内容标识符。此模式以分布式方式确保数据隐私和不变性。仿真结果表明,该方案在保持无损加密的同时,在安全性方面具有较高的有效性。本期特刊选择的所有论文都表明了应用区块链和去中心化解决方案对社会公益的重要性。由于无数的应用场景,以及对互联网服务民主化和去中心化的不断需求,区块链和去中心化技术在未来几年仍将是新技术的灵感来源。
{"title":"Guest Editorial: Blockchain and decentralised solutions for social good","authors":"Barbara Guidi,&nbsp;Ombretta Gaggi,&nbsp;Andrea Michienzi","doi":"10.1049/ntw2.12086","DOIUrl":"10.1049/ntw2.12086","url":null,"abstract":"&lt;p&gt;Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.&lt;/p&gt;&lt;p&gt;The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.&lt;/p&gt;&lt;p&gt;A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.&lt;/p&gt;&lt;p&gt;This Special Issue is composed of four peer-reviewed papers of excellent quality.&lt;/p&gt;&lt;p&gt;Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.&lt;/p&gt;&lt;p&gt;Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 4","pages":"153-154"},"PeriodicalIF":1.4,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43102231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1