{"title":"Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture","authors":"Peng Li, Jianing Du","doi":"10.1002/nem.70009","DOIUrl":"https://doi.org/10.1002/nem.70009","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6<sup>th</sup> Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing","authors":"Na Liu","doi":"10.1002/nem.70011","DOIUrl":"https://doi.org/10.1002/nem.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth in intelligent digital media interaction systems (IDMIS) has created new difficulties in controlling and optimizing content distribution and engagement, especially with the impending 6G networks. The purpose of the investigate is to create an intelligent system that uses 6G network slicing to increase digital media communication and user experience through seamless connectivity, dynamic content distribution, and real-time engagement. The structure includes a dynamic, multilayered architecture for IDMIS, and network capital is allocated through 6G network slicing based on user demand and content type. The system includes machine learning (ML) algorithms that predict user behavior and optimize media delivery in real time. To correctly predict user behavior, the research gathers data that capture users' performance and preference (historical interaction data, demographics, contextual data, and user feedback). Once collected, data are processed to reduce dimensionality using principal component analysis (PCA). Refined Support Vector Machine Integrated with Flying Fox Optimization (RSVM-FFO) predicts user behavior and optimizes media delivery in real time. Metrics are used to evaluate the RSVM-FFO approach, such as F1-score (98.12%), accuracy (98.59%), precision (98.57%), and recall (98.17%). The results reveal that the suggested systems considerably improve media interaction effectiveness by reducing latency and bandwidth usage while providing a highly responsive user experience. Finally, advancement in the delivery of high-performance, customized media services is the combination of an IDMIS with 6G network slicing.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission","authors":"Yunxiang Qi","doi":"10.1002/nem.70007","DOIUrl":"https://doi.org/10.1002/nem.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Many smart gadgets are connecting to the Internet, and Internet-of-Things (IoT) technologies are enabling a variety of applications. Artificial intelligence (AI) of Things (AIoT) devices are anticipated to possess human-like decision-making, reasoning, perception, and other capacities with the combination of AI and IoT. AIoT gadgets are expected to be extensively utilized across several domains, as anticipated by 6G networks. With AI's steady advancements in speech recognition, computer vision, and natural language processing—not to mention its ability to analyze large amounts of data—semantic communication is now feasible. A new paradigm in wireless communication is opened by semantic communication, which seeks to explore the meaning behind the bits and only transmits the information that may be used, as opposed to attaining error-free transmission. The combination of IoT with AI provides prominent features to overcome various important issues in cloud computing networks. However, there is bottleneck of delay and precision. Therefore, this paper proposed a new method to overcome this problem. First, the network slicing feature maps were extracted by convolutional neural networks. Next, the processing delay is reduced by semantic compression. Simulation results show that the proposed approach makes 99.2% reduction in communication complexity and an 80% reduction in transmission delay as compared with traditional methods. Taking the Resnet18 network as an example, the running time of the semantic communication method is only 0.8% of the traditional method.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges","authors":"Srisht Fateh Singh, Vladyslav Nekriach, Panagiotis Michalopoulos, Andreas Veneris, Jeffrey Klinck","doi":"10.1002/nem.70005","DOIUrl":"https://doi.org/10.1002/nem.70005","url":null,"abstract":"<p>This paper investigates the current landscape of option trading platforms for cryptocurrencies, encompassing both centralized and decentralized exchanges. Option contracts in cryptocurrency markets offer functionalities akin to traditional markets, providing investors with tools to mitigate risks, particularly those arising from price volatility, while also allowing them to capitalize on future volatility trends. The paper discusses these applications of option contracts in the context of decentralized finance (DeFi), emphasizing their utility in managing market uncertainties. Despite a recent surge in the trading volume of options contracts on cryptocurrencies, decentralized platforms account for less than 1<i>%</i> of this total volume. Hence, this paper takes a closer look by examining the design choices of these platforms to understand the challenges hindering their growth and adoption. It identifies technical, financial, and adoption-related challenges that decentralized exchanges face and provides commentary on existing platform responses. Subsequently, the paper analyzes the impact of absent options markets on the inefficiencies of automated market maker liquidity. It examines historical on-chain data for 14 ERC20 token pairs on Ethereum. The analysis shows 1143 instances in which deeper liquidity levels, as high as <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>×</mo>\u0000 <mn>6</mn>\u0000 </mrow>\u0000 <annotation>$$ times 6 $$</annotation>\u0000 </semantics></math> more, could have been achieved by establishing an options market.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaime Galán-Jiménez, Mohamed Faten Zhani, José Gómez-delaHiz, John Kaippallimalil
{"title":"Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem","authors":"Jaime Galán-Jiménez, Mohamed Faten Zhani, José Gómez-delaHiz, John Kaippallimalil","doi":"10.1002/nem.70006","DOIUrl":"https://doi.org/10.1002/nem.70006","url":null,"abstract":"<p>As of today, transport control protocol (TCP) remains the de-facto transport protocol in the Internet. However, TCP may incur high delays, especially when retransmitting lost packets as they have to be retransmitted only by the source and after a timeout that is roughly equal to a round trip time. To reduce such delay, recent work proposed to deploy a special network function, called transport assistant (TA), that is able to detect and retransmit lost TCP packets from inside the network rather than the source and thereby reduces retransmission delays. Unfortunately, there is no study on the impact of the placement of the TA on its performance benefits in terms of packet delivery delay. In this paper, we focus on the TA placement problem. We discuss the trade-offs and parameters to be considered to select the best placement for the TA. We first mathematically model the TCP packet delivery delay, that is, the time needed to deliver TCP packets, when the TA is deployed. We also formulate, as an integer linear program (ILP), the problem of placing multiple TAs in order to reduce TCP packet delivery delays while minimizing their deployment costs. We consider use-cases, one where a TA could handle a single flow and another where a TA could handle multiple flows. We then propose two heuristics to solve the problem with minimal execution time. Through experiments, we demonstrated that the deployment of TAs could reduce TCP packet delivery delays by up to 30% and could be leveraged to guide routing and load balancing. Moreover, we show that using the proposed heuristics for placing TAs could lead to performance that is close to the optimal solutions obtained with the ILP but with lower execution time.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Security Threats and Defense Mechanisms for 6G Multi-Virtual Network Scenarios","authors":"Yu Zhou","doi":"10.1002/nem.70003","DOIUrl":"https://doi.org/10.1002/nem.70003","url":null,"abstract":"<div>\u0000 \u0000 <p>The introduction of 6G networks presents substantial challenges for network security, particularly in multi-virtual network topologies. The combination of network function virtualization (NFV) and software-defined networking (SDN) in 6G is designed to increase scalability and flexibility; nevertheless, these advances complicate network security management. The goal is to identify risks to network security and develop defense solutions for 6G multi-virtual network situations. SDN's virtualized network functions (VNFs) are utilized to provide stateful firewall services that provide scalable and dynamic threat prevention. The SDN controller is critical in developing a set of rules to prevent risky network connectivity and decrease possible risks. 6G multi-virtual network domains—attacking threats that involve different socket addresses so complex that usually applicable protection measures hardly tackle that scenario, machine learning (ML) algorithms, and Intelligent Osprey Optimized Versatile Random Forest (IOO-VRF) model—have been proposed for potentially harmful connection detection and predicting cyber threats accessing the network. Multiple open-access sources can be exploited to gather diverse data for collecting valuable information on studying network traffic and cyber threats. The experimental results indicate that IOO-VRF achieved prediction accuracy comparable to that of other traditional algorithms. The proposed model is assessed on various types of metrics, including accuracy (98%), precision (97.4%), recall (94%), and F1-score (93%). The results emphasized the importance of ML in combination with SDN and NFV for security in the case of resilient, expandable, and flexible security measures for future multi-virtual 6G network communications networks.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles","authors":"Xueqin Ni, Zhiyuan Dong, Xia Rong","doi":"10.1002/nem.70004","DOIUrl":"https://doi.org/10.1002/nem.70004","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid growth of vehicle networks in the Internet of Vehicles (IoV) needs novel approaches to optimizing network resource allocation and enhancing traffic management. Sixth-generation (6G) network slicing, when paired with artificial intelligence (AI), has enormous potential in this field. The purpose of this research is to investigate the use of AI-driven 6G network slicing (NS) for efficient usage of resources and accurate traffic prediction in IoV systems. A unique network design is suggested, combining data-driven approaches and dynamic network slicing. Data are acquired from vehicular sensors and traffic monitoring systems, and log transformation is used to handle exponential growth patterns like vehicle counts and congestion levels. The Fourier transform (FT) is used to extract frequency-domain information from traffic data, which allows for the detection of periodic patterns, trends, and anomalies such as vehicle velocity and traffic density. The Dipper Throated Optimized Efficient Elman Neural Network (DTO-EENN) is used to forecast traffic and optimize resources. This technology allows the system to predict traffic patterns and dynamically alter network slices to ensure optimal resource allocation while reducing latency. The results show that the suggested AI-driven NS technique increases forecast accuracy and network performance while dramatically reducing congestion levels. The research indicates that AI-driven 6G based NS offers a solid framework for optimizing IoV performance.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chang Liu, Jin Wang, Chang Liu Sr, Jie Wang, Li Tian, Xiao Yu, Min Wei
{"title":"SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time-Sensitive Networks","authors":"Chang Liu, Jin Wang, Chang Liu Sr, Jie Wang, Li Tian, Xiao Yu, Min Wei","doi":"10.1002/nem.70001","DOIUrl":"https://doi.org/10.1002/nem.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>Although many studies have conducted the traffic scheduling of time-sensitive networks, most focus on small-scale static scheduling for specific scenarios, which cannot cope with dynamic and rapid scheduling of time-triggered (TT) flows generated in scalable scenarios in the Industrial Internet of Things. In this paper, we propose a Scalable TT flow scheduling method based on Dynamic Online Grouping in industrial time-sensitive networks (SDOG). To achieve that, we establish an undirected weighted flow graph based on the conflict index between TT flows and divide available time into equally spaced time windows. We dynamically group the TT flows within each window locally. When the number of flows to be scheduled doubles, we can achieve scalable and efficient solutions to efficiently schedule dynamic TT flows, avoiding unnecessary conflicts during data communication. In addition, a topology pruning strategy is adopted to prune the network topology of each group, reducing unnecessary link variables and further effectively shortening the scheduling time. Experimental results validated our expected performance and demonstrated that our proposed SDOG scheduling method has advantages in terms of overall traffic schedulability and average time for scheduling individual traffic.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143121256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility","authors":"Nils Höger, Nils Rodday, Gabi Dreo Rodosek","doi":"10.1002/nem.70002","DOIUrl":"https://doi.org/10.1002/nem.70002","url":null,"abstract":"<p>The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao-Rexford model. Route leaks may lead to traffic misdirection, causing performance issues and potential security risks, often due to mistakes and misconfiguration. Several potential solutions have been published and are currently greatly discussed within the Internet Engineering Task Force (IETF) but have yet to be widely implemented. One approach is the Autonomous System Provider Authorization (ASPA). In addition to these new approaches, there are also efforts to use existing BGP functionalities to detect and prevent route leaks. In this paper, we implement the Down Only (DO) Community and Only to Customer (OTC) Attribute approaches, using them isolated and in conjunction with ASPA. Our research indicates that implementing a DO/OTC deployment strategy focusing on well-interconnected ASes could significantly reduce route leaks. Specifically, we observed mitigation of over 98% of all route leaks when DO and OTC were deployed by the top 5% of the most connected ASes. We show that combining DO/OTC and ASPA can greatly enhance ASPA's route leak prevention capabilities.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143121003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks","authors":"Daniel Spiekermann","doi":"10.1002/nem.2326","DOIUrl":"https://doi.org/10.1002/nem.2326","url":null,"abstract":"<p>Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy. Leveraging a combination of overlay and underlay capture positions, this paper examines the strategic impact of network positioning on anomaly detection accuracy, particularly in environments utilizing software-defined networking (SDN) and network function virtualization (NFV). Through controlled testing with realistic attack scenarios, including data exfiltration, denial of service, and malware infiltration, the advantages and constraints of each capture position are demonstrated. The findings underscore the necessity of adaptable capture mechanisms to address variability in data volume, encapsulation challenges, and privacy concerns unique to virtualized ecosystems. The paper further introduces a cost calculation model that evaluates each capture position by weighting key factors, enabling an optimized trade-off between detection accuracy and resource efficiency. The derived classification of the positional value significantly improves real-time detection of both internal and external threats within multitenant networks.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2326","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}