IEEE Networking Letters最新文献

筛选
英文 中文
Comprehensive Advanced Persistent Threats Dataset 综合高级持续威胁数据集
IEEE Networking Letters Pub Date : 2025-03-17 DOI: 10.1109/LNET.2025.3551989
Abdussamad Syed;Boubakr Nour;Makan Pourzandi;Chadi Assi;Mourad Debbabi
{"title":"Comprehensive Advanced Persistent Threats Dataset","authors":"Abdussamad Syed;Boubakr Nour;Makan Pourzandi;Chadi Assi;Mourad Debbabi","doi":"10.1109/LNET.2025.3551989","DOIUrl":"https://doi.org/10.1109/LNET.2025.3551989","url":null,"abstract":"Due to the complex nature of Advanced Persistent Threats (APTs) and their rapid evolvement, comprehensive datasets are needed to understand them. However, acquiring such datasets remains a challenge due to the lack of precise reports describing the attacks, realistic emulation, the extensive attack diversity, and concerns regarding data privacy. In this letter, we built a testbed for APTs and implemented 23 campaigns for 12 APTs using MITRE Caldera. For each campaign, we share the adversary profile, the abilities, the low-level telemetries, and the MITRE techniques. By making this comprehensive dataset openly accessible, our work supports academia and industry to strengthen cybersecurity research and develop robust defenses against the constantly evolving APTs.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"150-154"},"PeriodicalIF":0.0,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning for AoI-Aware UAV-Assisted Networks With RF Energy Harvesting 基于射频能量收集的aoi感知无人机辅助网络的深度强化学习
IEEE Networking Letters Pub Date : 2025-03-13 DOI: 10.1109/LNET.2025.3550931
Gaurav Kumar Pandey;Devendra Singh Gurjar;Suneel Yadav;Xingwang Li
{"title":"Deep Reinforcement Learning for AoI-Aware UAV-Assisted Networks With RF Energy Harvesting","authors":"Gaurav Kumar Pandey;Devendra Singh Gurjar;Suneel Yadav;Xingwang Li","doi":"10.1109/LNET.2025.3550931","DOIUrl":"https://doi.org/10.1109/LNET.2025.3550931","url":null,"abstract":"This letter considers UAV-assisted data collection from energy-constrained Internet of Things (IoT) devices. Herein, a UAV utilizes radio frequency-based wireless power transfer technique to charge multiple IoT devices or schedules one IoT device to transmit its sensed data. Using the harvested energy, the IoT devices share the collected data with the UAV as per their schedule. For this setup, we aim to minimize IoT devices’ average Age of Information (AoI) by optimally controlling the UAV’s trajectory and scheduling of IoT devices while adhering to the energy consumption limitations of UAV and IoT devices. Considering the dynamic scenario for the considered network, the optimization problem is modeled as a Markov Decision Process and solved through dueling double deep Q-networks (D3QN) algorithm. The simulation results show that the proposed framework outperforms the baseline methods in reducing the average AoI of the IoT devices.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"88-92"},"PeriodicalIF":0.0,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Trust Architecture for Secure IoT Communication in 6G 面向6G安全物联网通信的自适应信任架构
IEEE Networking Letters Pub Date : 2025-03-05 DOI: 10.1109/LNET.2025.3566909
Ijaz Ahmad;Shakthi Gimhana;Ijaz Ahmad;Erkki Harjula
{"title":"Adaptive Trust Architecture for Secure IoT Communication in 6G","authors":"Ijaz Ahmad;Shakthi Gimhana;Ijaz Ahmad;Erkki Harjula","doi":"10.1109/LNET.2025.3566909","DOIUrl":"https://doi.org/10.1109/LNET.2025.3566909","url":null,"abstract":"This letter presents an adaptive trust architecture that enables secure, low-latency communication in 6G-enabled Internet of Things (IoT) networks, centering around a novel Adaptive Zero Trust Manager (AZTM) deployed at the network edge. Integrating zero trust principles with a lightweight, consensus-free blockchain, AZTM provides real-time authentication and behavior-based trust evaluation while maintaining energy efficiency. It supports secure device communication through dynamic key exchange, eliminating reliance on pre-shared secrets or centralized trust authorities. The system is validated through implementation on resource-constrained IoT devices, demonstrating low-latency performance, resilience to common attacks, and suitability for mission-critical 6G applications such as healthcare, industrial automation, and intelligent transport.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"113-116"},"PeriodicalIF":0.0,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10985891","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Communication in Gaussian Multiple Access Wiretap Channels: A Deep Learning and Friendly Jamming Approach 高斯多址窃听信道中的安全通信:一种深度学习和友好干扰方法
IEEE Networking Letters Pub Date : 2025-03-01 DOI: 10.1109/LNET.2025.3566243
Sankalp;Lata;Gaurang Sondur;Mahendra K. Shukla;Om Jee Pandey;Maxime Guillaud
{"title":"Secure Communication in Gaussian Multiple Access Wiretap Channels: A Deep Learning and Friendly Jamming Approach","authors":"Sankalp;Lata;Gaurang Sondur;Mahendra K. Shukla;Om Jee Pandey;Maxime Guillaud","doi":"10.1109/LNET.2025.3566243","DOIUrl":"https://doi.org/10.1109/LNET.2025.3566243","url":null,"abstract":"The use of deep learning (DL) in communication systems shows great promise, particularly through DL-based physical-layer techniques with autoencoders (AEs) for end-to-end learning. This letter presents an AE-based DL framework to enhance physical-layer security in scenarios where multiple transmitters communicate with the receiver under eavesdropping threats, specifically within a Gaussian multiple-access wiretap channel. A key feature is a friendly jammer that emits a high-power Gaussian signal to disrupt eavesdroppers. The proposed framework is particularly relevant for security-critical applications such as wireless health monitoring systems, where safeguarding sensitive data is paramount. We assess secrecy performance by analyzing the symbol error rate among users in the presence of both an eavesdropper and a jammer. Simulation results show that our DL-based Gaussian jamming strategy significantly improves secrecy performance, effectively safeguarding communications from eavesdropping. This letter highlights the potential of DL techniques to enhance communication security in complex multi-user environments.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"78-82"},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Resource Optimization for ML-Based UAV Condition Monitoring With Vibration Analysis 基于机器学习的无人机状态监测网络资源优化与振动分析
IEEE Networking Letters Pub Date : 2025-02-24 DOI: 10.1109/LNET.2025.3545286
Alexandre Gemayel;Dimitrios Michael Manias;Abdallah Shami
{"title":"Network Resource Optimization for ML-Based UAV Condition Monitoring With Vibration Analysis","authors":"Alexandre Gemayel;Dimitrios Michael Manias;Abdallah Shami","doi":"10.1109/LNET.2025.3545286","DOIUrl":"https://doi.org/10.1109/LNET.2025.3545286","url":null,"abstract":"As smart cities begin to materialize, the role of Unmanned Aerial Vehicles (UAVs) and their reliability becomes increasingly important. One aspect of reliability relates to Condition Monitoring (CM), where Machine Learning (ML) models are leveraged to identify abnormal and adverse conditions. Given the resource-constrained nature of next-generation edge networks, the utilization of precious network resources must be minimized. This letter explores the optimization of network resources for ML-based UAV CM frameworks. The developed framework uses experimental data and varies the feature extraction aggregation interval to optimize ML model selection. Additionally, by leveraging dimensionality reduction techniques, there is a 99.9% reduction in network resource consumption.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"108-112"},"PeriodicalIF":0.0,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2024 Index IEEE Networking Letters Vol. 6 IEEE网络通讯第6卷
IEEE Networking Letters Pub Date : 2025-02-24 DOI: 10.1109/LNET.2025.3544938
{"title":"2024 Index IEEE Networking Letters Vol. 6","authors":"","doi":"10.1109/LNET.2025.3544938","DOIUrl":"https://doi.org/10.1109/LNET.2025.3544938","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"278-289"},"PeriodicalIF":0.0,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10900739","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GNNPPOR: A Proximal Policy Optimization Multi-Factor Joint Routing Approach Based on Graph Neural Networks in FANETs GNNPPOR:基于图神经网络的近端策略优化多因素联合路由方法
IEEE Networking Letters Pub Date : 2025-02-17 DOI: 10.1109/LNET.2025.3542762
Jian Song;Jing Li;Qingwang Wang;Yebo Gu;Tao Shen
{"title":"GNNPPOR: A Proximal Policy Optimization Multi-Factor Joint Routing Approach Based on Graph Neural Networks in FANETs","authors":"Jian Song;Jing Li;Qingwang Wang;Yebo Gu;Tao Shen","doi":"10.1109/LNET.2025.3542762","DOIUrl":"https://doi.org/10.1109/LNET.2025.3542762","url":null,"abstract":"Given the significant challenges of low resource utilization, load imbalance, and difficulties in meeting quality of service requirements in Flying Ad Hoc Networks (FANETs) routing protocols, this letter proposes a Graph Neural Network (GNN)-based approach for proximal policy optimization routing (GNNPPOR). The approach aims to integrate traffic engineering into FANETs to effectively distribute network load and meet quality of service requirements. In GNNPPOR, we design a GNN model that first aggregates multi-dimensional network state information efficiently through a message-passing mechanism. Subsequently, the network state is updated in real-time using a gated recurrent unit to adapt to dynamic changes in the FANETs network state. Finally, a multi-factor joint decision-making approach is proposed to identify suitable routes for each traffic based on the current network state. Simulation results demonstrate that GNNPPOR outperforms existing methods in several key metrics. Specifically, packet delivery rate increased by 25.3%, while energy consumption and network jitter decreased by 12.8% and 24.9%, respectively.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"130-134"},"PeriodicalIF":0.0,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Polynomial-Time Algorithms for Consistency-Aware Multi-Server Network Design in Delay-Sensitive Applications 延迟敏感应用中一致性感知多服务器网络设计的近似多项式时间算法
IEEE Networking Letters Pub Date : 2025-02-12 DOI: 10.1109/LNET.2025.3541351
Masaki Oda;Akio Kawabata;Eiji Oki
{"title":"Approximation Polynomial-Time Algorithms for Consistency-Aware Multi-Server Network Design in Delay-Sensitive Applications","authors":"Masaki Oda;Akio Kawabata;Eiji Oki","doi":"10.1109/LNET.2025.3541351","DOIUrl":"https://doi.org/10.1109/LNET.2025.3541351","url":null,"abstract":"This letter proposes two polynomial-time approximation algorithms for allocating servers to design a consistency-aware multi-server network for delay-sensitive applications. Each algorithm selects servers and determines the main-secondary server pairs to minimize the total delay. Previous work has not provided any polynomial-time algorithm. The proposed algorithms are theoretically guaranteed to output an approximate value within three times the optimal value. Numerical results show that the more computationally efficient of the two algorithms is 46.4 to <inline-formula> <tex-math>$5.26 times 10^{4}$ </tex-math></inline-formula> times faster than an integer linear programming technique, while the maximum delay is, on average, merely 1.0196 times the optimal value.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"7 2","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10883039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144308216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial SI on Advances in AI for 6G Networks 人工智能在6G网络中的进展
IEEE Networking Letters Pub Date : 2025-02-11 DOI: 10.1109/LNET.2024.3519937
Hatim Chergui;Kamel Tourki;Jun Wu
{"title":"Editorial SI on Advances in AI for 6G Networks","authors":"Hatim Chergui;Kamel Tourki;Jun Wu","doi":"10.1109/LNET.2024.3519937","DOIUrl":"https://doi.org/10.1109/LNET.2024.3519937","url":null,"abstract":"The advent of 6G networks heralds a new era of telecommunications characterized by unparalleled connectivity, ultra-low latency, and immersive applications such as holographic communication and Industry 5.0. However, these advancements also introduce significant complexities in network management and service orchestration. This Special Issue of IEEE N<sc>etworking</small> L<sc>etters</small> explores cutting-edge research on Artificial Intelligence (AI)-driven automation techniques designed to address these challenges. The selected works span a diverse array of AI paradigms—ranging from generative AI (GenAI) and reinforcement learning to multi-agent systems and federated learning—showcasing their applications across various 6G technological domains. By highlighting these innovations, this issue aims to provide valuable insights into the pivotal role of AI in shaping the future of 6G networks.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"215-216"},"PeriodicalIF":0.0,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10880116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Networking Letters Author Guidelines IEEE网络通讯作者指南
IEEE Networking Letters Pub Date : 2025-02-11 DOI: 10.1109/LNET.2025.3526350
{"title":"IEEE Networking Letters Author Guidelines","authors":"","doi":"10.1109/LNET.2025.3526350","DOIUrl":"https://doi.org/10.1109/LNET.2025.3526350","url":null,"abstract":"","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"276-277"},"PeriodicalIF":0.0,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10879520","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信