Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz, Changhai Sun
{"title":"A distributed algorithm with network-independent step-size and event-triggered mechanism for economic dispatch problem","authors":"Baitong Chen, Jianhua Yang, Wei Lu, Witold Pedrycz, Changhai Sun","doi":"10.1002/nem.2276","DOIUrl":"10.1002/nem.2276","url":null,"abstract":"<p>The economic dispatch problem (EDP) poses a significant challenge in energy management for modern power systems, particularly as these systems undergo expansion. This growth escalates the demand for communication resources and increases the risk of communication failures. To address this challenge, we propose a distributed algorithm with network-independent step sizes and an event-triggered mechanism, which reduces communication requirements and enhances adaptability. Unlike traditional methods, our algorithm uses network-independent step sizes derived from each agent's local cost functions, thus eliminating the need for detailed network topology knowledge. The theoretical derivation identifies a range of step size values that depend solely on the objective function's strong convexity and the gradient's Lipschitz continuity. Furthermore, the proposed algorithm is shown to achieve a linear convergence rate, assuming the event triggering threshold criteria are met for linear convergence. Numerical experiments further validate the effectiveness and advantages of our proposed distributed algorithm by demonstrating its ability to maintain good convergence characteristics while reducing communication frequency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinyang Li, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang
{"title":"Privacy-preserving data aggregation achieving completeness of data queries in smart grid","authors":"Xinyang Li, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang","doi":"10.1002/nem.2273","DOIUrl":"10.1002/nem.2273","url":null,"abstract":"<p>In smart grid systems, the control center formulates strategies and provides services by analyzing electricity consumption data. However, ensuring the privacy and security of user data is a critical concern. While traditional data aggregation schemes can provide a certain level of privacy protection for users, they also impose limitations on the control center's access to fine-grained data. To address these challenges, we propose a privacy-preserving data aggregation scheme supporting data query (PAQ). We designed a multi-level data aggregation mechanism based on Paillier semi-homomorphic encryption to achieve efficient aggregation of user data in the control center. Additionally, a data query mechanism based on electricity consumption intervals is introduced, allowing the control center to query aggregated ciphertexts for different user categories from outsourced data on the cloud server. Security analysis demonstrates that PAQ design effectively solves security issues in data aggregation and query processes. Performance analysis indicates that the proposed scheme outperforms existing solutions in terms of efficiency.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wesley dos Reis Bezerra, Fernando Koch, Carlos Becker Westphall
{"title":"Performance of security options for message protocols: A comparative analysis","authors":"Wesley dos Reis Bezerra, Fernando Koch, Carlos Becker Westphall","doi":"10.1002/nem.2274","DOIUrl":"10.1002/nem.2274","url":null,"abstract":"<p>We explore the challenges around security configuration and performance while utilizing publish–subscribe protocols in the Internet of Things, edge computing, and fog computing. Issues in security configuration can lead to disruptions and higher operation costs. These issues can be prevented by selecting the appropriate transmission technology for each configuration, considering the variations in sizing, installation, sensor profile, distribution, security, networking, and locality. We introduce a comparative analysis of different configurations around a smart agriculture use case. For that, we implemented a simulation environment to generate datasets relevant to research and compare the results in terms of performance, resource utilization, security, and resilience—focused on authentication process. This analysis provides a blueprint to decision support for fog computing engineers on the best practices around security configurations.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles","authors":"Kayalvizhi Manikandan, Ramamoorthy Sriramulu","doi":"10.1002/nem.2271","DOIUrl":"10.1002/nem.2271","url":null,"abstract":"<p>Swarm of Unmanned Aerial Vehicles (UAVs) broaden the field of application in various fields like military surveillance, crop monitoring in agriculture, combat operations, etc. Unfortunately, they are becoming increasingly susceptible to security attacks, such as jamming, information leakage and spoofing, as they become more common and in more demand. So, there is a wider need for UAVs, which requires the design of strong security procedures to fend off such attacks and security dangers. Even though several studies focused on security aspects, many questions remain unanswered, particularly in the areas of secure UAV-to-UAV communication, support for perfect forward secrecy and non-repudiation. In a battle situation, it is extremely important to close these gaps. The security requirements for the UAV communication protocol in a military setting were the focus of this study. In this paper, we present the issues faced by the UAV swarm, especially during military surveillance operations. To secure the communication link in UAV, a new protocol for UAV Swarm communication is proposed with anonymous secure messaging token-based protocol (ASMTP). The proposed protocol secures UAV-to-base station communication and safeguards the metadata of the sender and receiver nodes. The proposed model maintains the confidentiality, integrity and availability of data in the UAV Swarm and achieves robustness. In addition, it provides a different strategy for the cybersecurity gaps in the swarm of UAVs during military surveillance and combat operations.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Zhang, Jinmei Zhang, Lijun Yun, Jun Zhang, Junbo Su
{"title":"Privacy-protected object detection through trustworthy image fusion","authors":"Chao Zhang, Jinmei Zhang, Lijun Yun, Jun Zhang, Junbo Su","doi":"10.1002/nem.2270","DOIUrl":"10.1002/nem.2270","url":null,"abstract":"<p>The neural network-based technologies have emerged as a potent method for image fusion, object detection, and other computer vision tasks as the rapid development of deep learning. Multi-band infrared images, in particular, capture a more extensive range of radiation details and information compared to conventional single-band infrared images. Consequently, the fusion of multi-band infrared images can provide more features for object detection. However, it is crucial to consider that infrared images may contain sensitive information, potentially leading to privacy concerns. Ensuring datasets privacy protection plays a crucial role in the fusion and tracking process. To address both the need for improved detection performance and the necessity for privacy protection in the infrared environment, we proposed a procedure for object detection based on multi-band infrared image datasets and utilized the transfer learning technique to migrate knowledge learned from external infrared data to internal infrared data, thereby training the infrared image fusion model and detection model. The procedure consists of several steps: (1) data preprocessing of multi-band infrared images, (2) multi-band infrared image fusion, and (3) object detection. Standard evaluation metrics for image fusion and object detection ensure the authenticity of the experiments. The comprehensive validation experiments demonstrate the effectiveness of the proposed procedure in object detection tasks. Furthermore, the transfer learning can train our datasets and update the model without exposing the original data. This aspect of transfer learning is particularly beneficial for maintaining the privacy of multi-band infrared images during the fusion and detection processes.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workload prediction based on improved error correlation logistic regression algorithm and Cross-TRCN of spatiotemporal neural network","authors":"Xin Wan, Xiang Huang, Fuzhi Wang","doi":"10.1002/nem.2272","DOIUrl":"10.1002/nem.2272","url":null,"abstract":"<p>In view of the randomness of user network usage behavior in data centers, which leads to a large randomness in power load, and considering that a single randomness processing method is usually difficult to fully characterize the uncertain characteristics of the system, this paper proposes a dual fusion prediction analysis model based on an improved error correlation logic regression algorithm and a novel spatiotemporal neural network structure called Cross-TRCN. Two weight coefficients λ1 and λ2 are introduced to fuse the prediction results with different long-term sequence prediction performance, thereby further eliminating the influence of random errors. The results show that it is feasible to predict the workload of data centers based on the improved error correlation logic regression algorithm and the innovative spatiotemporal neural network structure Cross-TRCN.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMS2DC: Synchronous mobile sinks scheduling for data collection in internet of things-enabled wireless sensor networks","authors":"Nagalapuram Selvarajan Swapna, Raguru Jaya Krishna, Avija Vishnuvardhan Reddy, Patike Kiran Rao, Perumalla Suman Prakash","doi":"10.1002/nem.2267","DOIUrl":"10.1002/nem.2267","url":null,"abstract":"<div>\u0000 \u0000 <p>Energy-efficient data collection in wireless sensor networks (WSNs) is crucial due to the limited battery capacity of sensor nodes (SNs). Using a mobile sink (MS) for data collection can lower the energy consumption of SNs to avoid relaying in WSNs. However, a single MS is not a feasible solution for large-scale WSNs, so it was necessary to use multiple MSs to collect data. A synchronous MS scheduling strategy for data collection (SMS2DC) is proposed in this paper, which uses two types of MS, a local MS to collect data from SN and a global MS to collect data from local MS. In this process, we begin by partitioning the network based on chemical reaction optimization. For each partition, a MS is assigned and scheduled using a path construction strategy according to a geometric path construction approach. In addition, a global MS is scheduled based on a local MS trajectory by identifying the most appropriate collision point to collect data. As a result, the algorithm increases data collection accuracy while minimizing network data loss. The asymptotic time complexity of the proposed SMS2DC algorithm needed <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>O</mi>\u0000 <mfenced>\u0000 <msup>\u0000 <mi>n</mi>\u0000 <mn>2</mn>\u0000 </msup>\u0000 </mfenced>\u0000 </mrow>\u0000 <annotation>$$ Oleft({n}^2right) $$</annotation>\u0000 </semantics></math>. The comparison results show the superiority of the proposed SMS2DC strategy under multiple scenarios under various deployment conditions.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140612709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data sharing mode of dispatching automation system based on distributed machine learning","authors":"Xiaoli He, Mi Luo, Yurui Hu, Feng Xiong","doi":"10.1002/nem.2269","DOIUrl":"10.1002/nem.2269","url":null,"abstract":"<p>The difficulties of sending massive amounts of data between several data centres are examined in this work, with particular attention paid to how poorly current scheduling algorithms handle point-to-multipoint transfers and transmission time limits. In this research, a new method called multicast source-based tree (MSBT) is proposed for effectively handling point-to-multipoint transmissions in a certain amount of time. By allowing receivers to simultaneously receive data from several source points, MSBT introduces the idea of ‘source selection’ for the creation of multicast tree structure-based algorithms. Large data blocks are distributed as efficiently as possible using this method, which also guarantees effective transmission from a single-source point to several recipient locations. Furthermore covered in the article is how PV producers and sellers' capacity allocation is affected by the discount rate. These results offer insightful information on how decisions are made in related sectors. The development of new energy big data platforms underscores their significance; leaders in the industry, like United Power, Vision Energy and Goldwind, serve as prime examples.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140603077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adil Khan, Shabeer Ahmad, Ihsan Ali, Babar Hayat, Yanan Tian, Weixing Liu
{"title":"Dynamic mobility and handover management in software-defined networking-based fifth-generation heterogeneous networks","authors":"Adil Khan, Shabeer Ahmad, Ihsan Ali, Babar Hayat, Yanan Tian, Weixing Liu","doi":"10.1002/nem.2268","DOIUrl":"10.1002/nem.2268","url":null,"abstract":"<p>The adoption and application of mobile communication technology have rapidly escalated, leading to a significant upsurge in the demand of data traffic. Ultra-densification stands as one of the network solutions within the realm of 5G and beyond technologies, aimed to enhance data rates and network capacity. Heterogeneous networks (HetNets) are deployed with different types of small cells (SCs) in mobile networks to provide high capacity, data rate, throughput, and low latency communication. HetNet solves the problem of network densification at the expense of mobility management problems such as ping-pong handover, unnecessary handovers, handover delay, and cell load. This paper introduces an enhanced optimal cell selection technique employing software-defined networking (SDN) to tackle the challenges of handover and mobility management in 5G and beyond 5G (B5G) HetNet. The proposed SDN-based cell selection scheme leverages linear programming (LP) to manage the mobility of users dynamically, facilitating the selection of the optimal cell for user equipment (UE) handover. This selection is based on multi-attribute decision-making criteria, which include user direction, received signal strength (RSS) value, cell load, and dwell time. By applying LP, computational overhead during cell selection is significantly reduced. The results indicate that the proposed scheme leads to a 39% reduction in number of handovers. This reduction signifies a substantial advancement in mitigating issues associated with frequent and unnecessary handovers, ultimately leading to minimized signaling overhead between UE and cells. Moreover, the proposed solution outperformed the existing scheme in terms of system's throughput and selects an optimal target cell with a lower cell load.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140324443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, Markus Bick
{"title":"Athena: Smart order routing on centralized crypto exchanges using a unified order book","authors":"Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, Markus Bick","doi":"10.1002/nem.2266","DOIUrl":"10.1002/nem.2266","url":null,"abstract":"<p>Most cryptocurrency spot trading occurs on centralized crypto exchanges, where offers for buying and selling are organized via an order book. In liquid markets, the price achieved for buying and selling deviates only slightly from the assumed reference price, that is, trading is associated with low implicit costs. However, compared to traditional finance, crypto markets are still illiquid, and consequently, the reduction of implicit costs is crucial for any trading strategy and of high interest, especially for institutional investors. This paper describes the design and implementation of Athena, a system that automatically splits orders across multiple exchanges to minimize implicit costs. For this purpose, order books are collected from several centralized crypto exchanges and merged into an internal unified order book. In addition to price and quantity, the entries in the unified order book are enriched with information about the exchange. This enables a smart order routing algorithm to split an order into several slices and execute these on several exchanges to reduce implicit costs and achieve a better price. An extensive evaluation shows the savings of using the smart order routing algorithm.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2266","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140314422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}