{"title":"Optimized DDoS Detection in Software-Defined IIoT Using a Hybrid Deep Neural Network Model","authors":"Enlai Chen, Na Zhang, Xiaomei Tu, Xiaoan Bao","doi":"10.1002/itl2.70012","DOIUrl":"https://doi.org/10.1002/itl2.70012","url":null,"abstract":"<div>\u0000 \u0000 <p>In the industrial internet of things (IIoT), DDoS attacks present a significant security challenge, requiring solutions that balance high detection accuracy with low computational cost. This study proposes a novel DDoS detection approach, IIoT Attack Detection based on CNN-mLSTM-KAN (IAD-CLK). By applying adaptive feature selection boosting (AFSB) during data preprocessing, the most relevant features are selected, reducing computational load. The CNN-mLSTM-KAN model combines depthwise separable convolutions, an mLSTM architecture enhanced with matrix operations, and the Kolmogorov–Arnold Network (KAN) to improve both detection performance and efficiency. Experimental results on the CICDDoS2019 dataset show an accuracy of 99.78% and a processing time of 0.122 ms, demonstrating the approach's effectiveness and suitability for IIoT environments.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Spatiotemporal Transformer Framework for Robust Threat Detection in 6G Networks","authors":"Guihua Wu","doi":"10.1002/itl2.70017","DOIUrl":"https://doi.org/10.1002/itl2.70017","url":null,"abstract":"<div>\u0000 \u0000 <p>6G networks provide high data rates, low latency, and massive connectivity but face security challenges due to the integration of communication, sensing, and AI. Traditional threat detection systems struggle to handle the complex interactions between dynamic network topologies and high-speed data flows in 6G environments. To address this, we propose a Spatiotemporal Dual-Stream Transformer framework that utilizes parallel graph-based and sequence-based attention mechanisms for real-time detection of threats such as cross-domain lateral attacks, large-scale DDoS, and sensor exploitation. Experimental results in a simulated 6G environment show an anomaly detection accuracy of 93.6% and an end-to-end inference latency of only 8.2 ms, while prototype testing achieves a 92.4% detection rate for 0-day exploits. These results establish a technical foundation and provide critical insights for the evolution of intelligent, secure 6G networks.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Intelligence in 5G Systems: Management of Resources in High-Altitude Infrastructures","authors":"Madhura K, Vikash Kumar Singh, Durga Sivashankar, Sourav Rampal, Swaroop Mohanty, Shubhi Goyal","doi":"10.1002/itl2.70015","DOIUrl":"https://doi.org/10.1002/itl2.70015","url":null,"abstract":"<div>\u0000 \u0000 <p>The emergence of the 5G generation has considerably advanced wireless communication systems, with higher data rates and increased connectivity. Massive Multiple Input Multiple Output (mMIMO) structures, utilizing numerous antennas, improve spectral efficiency. High-Altitude Platform Stations (HAPS) provide promising deployment structures for 5G networks. However, it faces challenges including useful resource allocation, interference mitigation, and dynamic beamforming adaptation. This study proposes an efficient method for optimizing communication systems through the use of HAPS through aggregate of game theory and dynamic optimization strategies. The model introduces a novel method known as Dynamic Levysalp Fusion Optimization (DLSFO), which integrates the Levy Flight Algorithm (LFA) and Improved Slap Swarm Optimization (ISSO) to enhance exploration and avoid local optima in mMIMO systems. The findings demonstrate the effectiveness of the proposed method with a system latency (SL), bit error rate (BER), and sum rate, showcasing its potential to increase overall system performance for multi-person, multi-beam conversation systems on HAPS.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MA2CL: Multi-Agent Actor-Critic Learning Scheme for Efficient Resource Management in 5G-Enabled NB-IoT Networks","authors":"Sadhvi Parashar, Rajeev Arya","doi":"10.1002/itl2.70011","DOIUrl":"https://doi.org/10.1002/itl2.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>The allocation of spectrum resources for the future 5G-enabled Narrowband Internet of Things (NB-IoT) is one of the most critical issues that need to be resolved. Due to the massive amount of data that will be generated by the IoT, the need for efficient allocation of resources is also immense. This paper presents a novel interference model for managing the allocation of resources and avoiding overlapping interference in the 5G-enabled NB-IoT Networks. It adopts Reinforcement Learning (RL)-based algorithms to improve the network throughput and prevent overlapping interference. The proposed method utilizes a Multi-Agent Actor-Critic Learning (MA<sup>2</sup>CL) algorithm, which can improve the efficiency of the network. The simulation result illustrates the prominent enhancement in the throughput and spectral efficiency of the network. The performances of the proposed algorithm have been compared with benchmark schemes and achieved a 33.3% increase in network throughput and a 26.67% boost in spectral efficiency, respectively. The proposed work for efficient NB-IoT resource management may be suitable in industrial automation and intelligent transportation systems.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interior Planning and Design Analysis Considering the Improvement of PDR Positioning Technology","authors":"Lili Wang","doi":"10.1002/itl2.70014","DOIUrl":"https://doi.org/10.1002/itl2.70014","url":null,"abstract":"<div>\u0000 \u0000 <p>To solve the problem of insufficient indoor positioning accuracy, a motion recognition and positioning method based on improved gait detection is proposed. In this method, the data is collected by an acceleration sensor, and the plane step estimation and vertical distance estimation algorithms are used to identify and analyze the features of different motion states. A one-dimensional convolutional neural network is used to improve the accuracy of step size estimation in the process of going up and down stairs. Comparative experimental results show that the total positioning errors of Pedestrian Step Estimation and Vertical Estimation algorithms are 0.605 m and 0.367 m, respectively. The total errors of the traditional Route Planning Algorithm and the Non-dominated Sorting Genetic Algorithm-iii algorithm are 3.071 m and 2.316 m, respectively. The experimental results show that the 1D-CNN algorithm has obvious advantages in the case of non-synchronous length, and the positioning errors in the <i>X</i>, <i>Y</i>, and <i>Z</i> axes are 0.298 m, 0.187 m, and 0.103 m, respectively, indicating that the proposed method significantly improves the accuracy of position estimation in the indoor environment.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kareem K. Ibrahim, Ahmed S. Abdulreda, Ali H. Abdulkhaleq
{"title":"Predictive Traffic Management: Spatiotemporal Analysis and Clustering for Urban Road Networks","authors":"Kareem K. Ibrahim, Ahmed S. Abdulreda, Ali H. Abdulkhaleq","doi":"10.1002/itl2.644","DOIUrl":"https://doi.org/10.1002/itl2.644","url":null,"abstract":"<div>\u0000 \u0000 <p>Communication, smart transportation, and computer developments in recent years have significantly enhanced the potential for intelligent traffic convenience, and efficiency solutions. The importance of intelligent transportation systems (ITS) in alleviating traffic congestion in cities cannot be overstated. A poorly planned road network, high vehicle volumes, and critical congestion areas are the main causes of traffic congestion. The paper presents a congestion avoidance method based on estimating traffic congestion in real-time on urban road networks and predicting alternate shortest routes. Using threshold-based cluster head selection and modified K-means clustering formulation algorithms, the proposed system can estimate the degree of congestion on diverse roads and predict the shortest route. In order to optimize network design and dynamic route planning, the proposed approach demonstrates spatiotemporal regularities of traffic congestion. There is a greater degree of comprehensiveness and objectiveness in the research results than in the existing methods.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Large Language Models for Network Security: A Multi-Expert Approach","authors":"Tianshun Lin, Changgui Xu, Jianshan Zhang, Nan Lin, Yuxin Liu, Yuanjun Zheng","doi":"10.1002/itl2.70016","DOIUrl":"https://doi.org/10.1002/itl2.70016","url":null,"abstract":"<div>\u0000 \u0000 <p>The optimization of diverse industrial edge computing tasks presents a significant challenge due to the dynamic and heterogeneous nature of industrial operational demands. While deep reinforcement learning (DRL) has shown promise, task-specific DRL models are often required in complex industrial edge networks, such as real-time anomaly detection and latency-sensitive decision-making, increasing computational overhead. This leads to large computational overheads, unstable performance, and increased energy consumption. Such a cost has become a concern in resource-limited industrial edge networks. In this paper, we propose a novel multi-expert optimization approach with the help of powerful large language models (LLMs). Our goals are to dynamically interpret industrial task requirements, activate specialized DRL experts, and synthesize their outputs into context-aware decisions. Specifically, we replace conventional gate networks with an LLM-based orchestrator. LLMs provide the benefits of semantic reasoning and contextual understanding when managing expert selection and collaboration. This approach eliminates the need to train unique DRL models for each industrial optimization task, thereby reducing deployment costs and improving scalability. Our experiments indicate that our approach achieves 13% higher anomaly detection accuracy when compared with traditional DRL methods.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Integrated Distributed Homogenous Clustered AODV Routing Analysis for Mobile Ad Hoc Networks","authors":"Arvind Kumar, Adesh Kumar, Anurag Vijay Agrawal, Piyush Kuchhal","doi":"10.1002/itl2.70002","DOIUrl":"https://doi.org/10.1002/itl2.70002","url":null,"abstract":"<div>\u0000 \u0000 <p>The research letter focuses on the hardware chip design of the Distributed Homogenous Clustered Ad hoc On-Demand Distance Vector (DHMC-AODV) routing protocol for MANETs. Distributed clustering has been used for the homogenous clustered routing formation that reduces the complex computational processing time and supports parallel computing in a multilevel clustering environment. The novelty of the work is that the hardware routing chip is verified in an FPGA-integrated environment with a scalable network design. The routed chip performance is determined based on parallel processing-enabled FPGA hardware indices such as IoBs, slices, and LUTs for the network configuration (<i>N</i> = 64). The performance improvement of the proposed protocol is claimed on ZedBoard FPGA, compared with the existing protocols in terms of power, E2ED, and overhead is 9.2%, 5.1% to 10.2%, 11.5% to 12.4%, and 14.3% to 16.1% respectively. The PDR is approximately 1.0 for all the protocols when the network is fully accessible.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143595134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Periodic and Non-Periodic Data Transmissions in 3GPP NR V2X Mode 2","authors":"Meng-Shiuan Pan, Ching-Yuan Hsu, Chien-Fu Cheng","doi":"10.1002/itl2.70005","DOIUrl":"https://doi.org/10.1002/itl2.70005","url":null,"abstract":"<div>\u0000 \u0000 <p>The 3rd Generation Partnership Project (3GPP) New Radio (NR) Vehicle-to-Everything (V2X) Mode 2 is a resource allocation mechanism for vehicular networks. By the 3GPP NR V2X Mode 2, vehicles first specify the cycles for radio resources (or say subchannels) they require and then reserve subchannels by themselves. While traveling on the road, vehicles may generate periodic and non-periodic data to support vehicular applications. Since vehicles can obtain subchannels periodically, we can observe that the reserved subchannels may be wasted if vehicles have no data or are not sufficient if vehicles are demanded to disseminate unexpected event packets from the application layer. In this work, we propose a resource reservation interval determination scheme to facilitate data transmissions. Additionally, we design a resource-sharing mechanism for vehicles to share their unused subchannels. Simulation results demonstrate that the proposed methods outperform other approaches in various performance metrics. Specifically, the proposed approach increases subchannel utilization by up to 25% and reduces the packet drop ratio for event-driven traffic to nearly 0%.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143595133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Graphical Approach for Botnet Detection in IoT Edge Environments Using a Lightweight Dynamic Louvain Method","authors":"H. G. Mohan, Jalesh Kumar","doi":"10.1002/itl2.70010","DOIUrl":"https://doi.org/10.1002/itl2.70010","url":null,"abstract":"<div>\u0000 \u0000 <p>The increasing adoption of Internet of Things (IoT) devices has increased the risk of botnet attacks, posing significant threats to device integrity, network performance, and user privacy. Existing botnet detection methods rely on computationally intensive network flow analysis, which is not suitable for resource-constrained IoT edge environments. This study introduces a novel graphical approach for botnet detection using a lightweight dynamic Louvain method. The method dynamically constructs temporal network graphs where nodes represent devices and edges capture the interactions. The graph topological features are extracted, and edge weights are integrated based on communication patterns. The communities are identified in the network by applying the dynamic Louvain method, and the anomalies in the community structure are analyzed to detect botnet activities. Experimental evaluations on the BoT-IoT dataset show that the proposed approach achieves 99.3% accuracy, 99.1% precision, 99.1% recall, and a 99.3% F1-score. Further, the proposed method is compared with the traditional graph-based approaches and demonstrates superior performance in terms of detection speed, scalability, and resource efficiency.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143595135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}