Internet Technology Letters最新文献

筛选
英文 中文
Deep Learning-Driven Network Security Situation Awareness Method in 6G Environment 6G环境下深度学习驱动的网络安全态势感知方法
IF 0.9
Internet Technology Letters Pub Date : 2025-02-26 DOI: 10.1002/itl2.70006
Qianlin Tan
{"title":"Deep Learning-Driven Network Security Situation Awareness Method in 6G Environment","authors":"Qianlin Tan","doi":"10.1002/itl2.70006","DOIUrl":"https://doi.org/10.1002/itl2.70006","url":null,"abstract":"<div>\u0000 \u0000 <p>With the rapid advancement of computer technology, the incidence of network security breaches has significantly increased, leading to a corresponding rise in cyber-attacks. Traditional security defense mechanisms exhibit inherent limitations, characterized by their reactive nature and limited efficacy against unknown threats. In addition, these mechanisms often lack coordination among different components, further diminishing their overall effectiveness. In response to these challenges, this paper proposes a deep learning-driven network security situational assessment (DL-driven NSSA) method specifically designed for the 6G environment. Initially, a deep autoencoder (DAE) model is constructed to identify various types of attacks within the network. Subsequently, the model undergoes rigorous testing to calculate attack probabilities, determine impact scores for each attack, and compute the overall network security situational value. Experimental results demonstrate that the proposed DAE model outperforms existing models in terms of accuracy and recall rate, thereby enhancing the precision and reliability of assessment outcomes.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Bidirectional Secure Authentication Protocol for Mobile Edge Computing in 6G Networks 面向6G网络移动边缘计算的轻量级双向安全认证协议
IF 0.9
Internet Technology Letters Pub Date : 2025-02-26 DOI: 10.1002/itl2.70001
Yuling Bai
{"title":"A Lightweight Bidirectional Secure Authentication Protocol for Mobile Edge Computing in 6G Networks","authors":"Yuling Bai","doi":"10.1002/itl2.70001","DOIUrl":"https://doi.org/10.1002/itl2.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>With the rapid development of 6G networks, the era of interconnectivity is fully upon us, accompanied by an explosive increase in the number of mobile smart devices. Solutions centered on cloud computing often fail to meet the real-time computing requirements of mobile smart devices and place significant demands on energy consumption and bandwidth. To address these challenges, edge computing has become a necessity. By deploying mobile edge computing systems close to the sources of information, it is possible to meet the demands for real-time services, data analysis optimization, and intelligent applications on mobile devices. Focusing on the issue of identity secure authentication between mobile devices and mobile edge computing servers in mobile edge computing scenarios, this paper proposes a lightweight bidirectional secure authentication protocol using elliptic curve cryptography (ECC). Constructed with elliptic curve encryption and hash functions, the protocol achieves features such as bidirectional secure authentication, anonymity protection for mobile users, and untraceability of mobile users, while also resisting various threats such as replay attacks and man-in-the-middle attacks. Through performance analysis and comparison with similar protocols, the proposed protocol demonstrates a low overall computational cost, making it particularly suitable for mobile smart devices with limited computing resources. Furthermore, the protocol was implemented using tools such as Visual Studio, and its performance was analyzed to illustrate its practical applicability and reliability.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Cloud and IoT-Based NLP in Virtual Reality for Sustainable Industry Innovation: A Pathway to Achieving SDG 9 (Industry, Innovation, and Infrastructure) 在虚拟现实中利用云和基于物联网的NLP促进可持续产业创新:实现可持续发展目标9(产业、创新和基础设施)的途径
IF 0.9
Internet Technology Letters Pub Date : 2025-02-26 DOI: 10.1002/itl2.659
Gyana Prakash Bhuyan, Bibhu Kalyan Mishra, Gopinath Palai
{"title":"Leveraging Cloud and IoT-Based NLP in Virtual Reality for Sustainable Industry Innovation: A Pathway to Achieving SDG 9 (Industry, Innovation, and Infrastructure)","authors":"Gyana Prakash Bhuyan,&nbsp;Bibhu Kalyan Mishra,&nbsp;Gopinath Palai","doi":"10.1002/itl2.659","DOIUrl":"https://doi.org/10.1002/itl2.659","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper explores the integration of cloud computing, IoT, Natural Language Processing (NLP), and virtual reality (VR) as a pathway to achieving Sustainable Development Goal (SDG) 9, which focuses on fostering industry innovation, building resilient infrastructure, and promoting sustainable industrialization. The convergence of these technologies provides a powerful toolkit for driving the next wave of industrial digital transformation. Cloud platforms such as AWS, Azure, IBM Watson, and Google Cloud offer scalability, flexibility, and efficiency, enabling industries to adopt advanced technologies like NLP and VR without significant upfront capital investment. By leveraging IoT for real-time monitoring and data collection, industries can optimize processes, reduce energy consumption, and enhance predictive maintenance, contributing to sustainability. NLP enables natural and efficient human-machine interaction, automating key processes and improving decision-making. The use of VR allows for immersive simulations that enhance worker training, product design, and infrastructure management, reducing waste and increasing safety. This combination of technologies fosters innovation, inclusivity, and sustainability in industrial operations. The paper highlights practical applications of these technologies, including smart manufacturing, predictive maintenance, and infrastructure monitoring, while emphasizing the role of cloud platforms in democratizing access to advanced tools for industries worldwide. Ultimately, this approach supports the achievement of SDG 9 by enabling more sustainable, resilient, and inclusive industrial practices.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing medical visual question answering: Evaluating the impact of enhanced images, augmented training data, and model selection 优化医学视觉问答:评估增强图像、增强训练数据和模型选择的影响
IF 0.9
Internet Technology Letters Pub Date : 2025-02-26 DOI: 10.1002/itl2.588
Ali Jaber Almalki
{"title":"Optimizing medical visual question answering: Evaluating the impact of enhanced images, augmented training data, and model selection","authors":"Ali Jaber Almalki","doi":"10.1002/itl2.588","DOIUrl":"https://doi.org/10.1002/itl2.588","url":null,"abstract":"<p>Visual question answering (VQA) has an interesting application in clinical decision support and enables clinicians to extract information from medical images through natural language queries. However, the limited nature of the datasets makes it particularly difficult to develop effective VQA models for the medical profession. The aim of this study was to overcome these obstacles by formally testing methods for data enhancement and model optimization. Specifically, we merged two medical VQA datasets, applied image preprocessing techniques, examined several state-of-the-art model architectures, and extensively trained the best-performing model on the enhanced data. The results showed that training the VGG16-LSTM model on sharper images than the merged dataset resulted in a significant performance improvement due to extending the training time to 200, with F1 scores of the training set 0.9674.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Enhancement in 5G Networks by Identifying Attacks Using Optimized Cosine Convolutional Neural Network 利用优化余弦卷积神经网络识别攻击增强5G网络安全
IF 0.9
Internet Technology Letters Pub Date : 2025-02-26 DOI: 10.1002/itl2.70003
Premalatha Santhanamari, Vijayakumar Kathirgamam, Lakshmisridevi Subramanian, Thamaraikannan Panneerselvam, Rathish Chirakkal Radhakrishnan
{"title":"Security Enhancement in 5G Networks by Identifying Attacks Using Optimized Cosine Convolutional Neural Network","authors":"Premalatha Santhanamari,&nbsp;Vijayakumar Kathirgamam,&nbsp;Lakshmisridevi Subramanian,&nbsp;Thamaraikannan Panneerselvam,&nbsp;Rathish Chirakkal Radhakrishnan","doi":"10.1002/itl2.70003","DOIUrl":"https://doi.org/10.1002/itl2.70003","url":null,"abstract":"<div>\u0000 \u0000 <p>The exponential growth of 5G networks has introduced advanced capabilities but also heightened susceptibility to sophisticated cyberattacks. To address this, a robust and optimized security framework is proposed, leveraging a Cosine Convolutional Neural Network (CCNN) for attack detection. By emphasizing angular correlations in data, the CCNN improves feature extraction by substituting cosine similarity-based adjustments for conventional convolution processes. To maximize the CCNN's performance, the Exponential Distribution Optimizer (EDO) is employed optimize CCNN. The optimal configuration of CCNN is achieved using EDO's probabilistic search mechanism, which is inspired by exponential distribution and helps to maintain a balanced exploration-exploitation strategy. This integrated approach significantly improves detection accuracy, robustness, and scalability while maintaining low computational overhead. Comprehensive evaluations demonstrate the model's efficacy in identifying diverse attack patterns in 5G networks, outperforming conventional methods. The proposed framework establishes a new benchmark for secure, intelligent 5G infrastructures, contributing to the advancement of cybersecurity in next-generation networks. The introduced approach attains higher accuracy of 99%.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-Based Reliability Scheme for Secure Data Sharing With Internet of Vehicles Networks 基于信任的车联网数据安全共享可靠性方案
IF 0.9
Internet Technology Letters Pub Date : 2025-02-26 DOI: 10.1002/itl2.70000
Arpit Jain, Ashok Kumar,  Mahadev, Jitendra Kumar Chaudhary, Saurabh Singh
{"title":"Trust-Based Reliability Scheme for Secure Data Sharing With Internet of Vehicles Networks","authors":"Arpit Jain,&nbsp;Ashok Kumar,&nbsp; Mahadev,&nbsp;Jitendra Kumar Chaudhary,&nbsp;Saurabh Singh","doi":"10.1002/itl2.70000","DOIUrl":"https://doi.org/10.1002/itl2.70000","url":null,"abstract":"<div>\u0000 \u0000 <p>With the Internet of Things (IoT) increasingly integrated into vehicles, drivers and passengers can access information anywhere, anytime. As the number of connected vehicles increases, new requirements for vehicular networks arise, including securing, robust, and scalable communication between vehicles and pedestrians. It encompasses the communication between vehicles and infrastructure, as well as the communication between vehicles and pedestrians. A real-time exchange of road condition information can be achieved through this method. An IoV network rogue node detection scheme is presented here using a combined trust model. Using a trust-based security algorithm, vehicles are assessed for trustworthiness and rogue vehicles are identified. Communication and data reliability are used to calculate direct Trust while neighboring vehicles' cooperation is used to calculate recommendation trust. According to simulation results, the proposed model is highly accurate and maintains a low detection delay while protecting evaluation data privacy. Trust updates are more efficient using this model, and malicious vehicles are detected more quickly than traditional schemes.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Computing Enables Assessment of Student Community Building: An Emotion Recognition Method Based on TinyML 边缘计算支持学生社区建设评估:一种基于TinyML的情感识别方法
IF 0.9
Internet Technology Letters Pub Date : 2025-02-24 DOI: 10.1002/itl2.645
Shuo Liu
{"title":"Edge Computing Enables Assessment of Student Community Building: An Emotion Recognition Method Based on TinyML","authors":"Shuo Liu","doi":"10.1002/itl2.645","DOIUrl":"https://doi.org/10.1002/itl2.645","url":null,"abstract":"<div>\u0000 \u0000 <p>Deep network-based video sentiment analysis is crucial for online evaluation tasks. However, these deep models are difficult to run on intelligent edge devices with limited computing resources. In addition, video data are susceptible to lighting interference, distortion, and background noise, which severely limits the performance of facial expression recognition. To relieve these issues, we develop an effective multi-scale semantic fusion tiny machine learning (TinyML) model based on a spatiotemporal graph convolutional network (ST-GCN) which enables robust expression recognition from facial landmark sequences. Specifically, we construct regional-connected graph data based on facial landmarks which are collected from cameras on different mobile devices. In existing spatiotemporal graph convolutional networks, we leverage the multi-scale semantic fusion mechanism to mine the hierarchical structure of facial landmarks. The experimental results on CK+ and online student community assessment sentiment analysis (OSCASA) dataset confirm that our approach yields comparable results.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Driven Big Data Analytics for Mobile Healthcare 面向移动医疗的人工智能驱动大数据分析
IF 0.9
Internet Technology Letters Pub Date : 2025-01-13 DOI: 10.1002/itl2.624
Dr. B. D. Parameshachari, Dr. Danilo Pelusi, Dr. Bhargavi Goswami
{"title":"AI-Driven Big Data Analytics for Mobile Healthcare","authors":"Dr. B. D. Parameshachari,&nbsp;Dr. Danilo Pelusi,&nbsp;Dr. Bhargavi Goswami","doi":"10.1002/itl2.624","DOIUrl":"https://doi.org/10.1002/itl2.624","url":null,"abstract":"<div>\u0000 \u0000 <p>This special issue highlights the key insights into the emerging trends and challenges of artificial intelligence (AI) driven big data analytics in mobile healthcare. The selected twenty-six articles, which include two letters, explore innovative applications and advancements in AI-driven healthcare technologies. The contributions of selected articles are divided into four main themes: Medical technology in healthcare communication and AI-driven healthcare, Fitness and Sports in Health Technology, Mental Health based on Behavior Analysis, and Healthcare Data Privacy with Blockchain. These articles collectively advance our understanding of AI applications in healthcare and reveal significant advancements in diagnostic accuracy, patient monitoring, data security and predictive analytics. Additionally, this review discusses the research findings and implications that will lead to groundbreaking insights in real-world applications, which could provide a clear path for learning a current healthcare technology in mobile health with AI.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hadamard and Riemann Matrix-Based SLM for PAPR Reduction in OTFS Signal 基于哈达玛矩阵和黎曼矩阵的 SLM,用于降低 OTFS 信号的 PAPR
IF 0.9
Internet Technology Letters Pub Date : 2024-10-27 DOI: 10.1002/itl2.591
Aare Gopal, Desireddy Krishna Reddy
{"title":"Hadamard and Riemann Matrix-Based SLM for PAPR Reduction in OTFS Signal","authors":"Aare Gopal,&nbsp;Desireddy Krishna Reddy","doi":"10.1002/itl2.591","DOIUrl":"https://doi.org/10.1002/itl2.591","url":null,"abstract":"<div>\u0000 \u0000 <p>In this letter, we study the peak-to-average power ratio (PAPR) reduction and bit error rate (BER) performances of the Hadamard and Riemann matrix-based selected mapping (SLM) technique for Orthogonal Time Frequency Space (OTFS) signals. Unlike the conventional phase sequence based on <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mrow>\u0000 <mo>{</mo>\u0000 <mrow>\u0000 <mo>±</mo>\u0000 <mn>1</mn>\u0000 </mrow>\u0000 <mo>,</mo>\u0000 <mrow>\u0000 <mo>±</mo>\u0000 <mi>j</mi>\u0000 </mrow>\u0000 <mo>}</mo>\u0000 </mrow>\u0000 </mrow>\u0000 <annotation>$$ left{pm 1,pm jright} $$</annotation>\u0000 </semantics></math>, which requires the entire sequence to extract the original signal at the receiver, the Hadamard and Riemann matrix-based SLM techniques require only the row index of the matrix, reducing the additional information necessary to extract the signal. Simulation results are presented to verify the PAPR and BER performance. The results are also compared with the existing normalized <i>μ</i>-law, rooting <i>μ</i>-law, and conventional SLM methods. The results demonstrate that the Riemann-based SLM technique shows significant performance improvement.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NB-IoT: Analytical Perspective of IP Data Delivery Variants NB-IoT: IP数据传输变体的分析视角
IF 0.9
Internet Technology Letters Pub Date : 2024-10-21 DOI: 10.1002/itl2.594
Priyatosh Mandal
{"title":"NB-IoT: Analytical Perspective of IP Data Delivery Variants","authors":"Priyatosh Mandal","doi":"10.1002/itl2.594","DOIUrl":"https://doi.org/10.1002/itl2.594","url":null,"abstract":"<div>\u0000 \u0000 <p>Narrowband Internet of Things (NB-IoT) is generally used for transmission of IP data and Non IP data from sensing device to a designated IoT server. Further, the designated server takes decision and accordingly send data to necessary devices for some designated activity. Two communication architectures such as control plane based and user plane based IP data deliveries are possible. In this work, we analytically find the delay to send NB-IoT IP data considering control plane as well as user plane of LTE-A network. Further, we compare the delay considering these two variants of data deliveries. Comparison results show that delay of the control plane based data delivery can be <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>33</mn>\u0000 <mo>%</mo>\u0000 </mrow>\u0000 <annotation>$$ 33% $$</annotation>\u0000 </semantics></math> more than the delay of user plane based data delivery.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信