International Journal of Network Management最新文献

筛选
英文 中文
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files 评估词袋嵌入法和词到向量嵌入法及降维对日志文件异常检测的影响
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-10-27 DOI: 10.1002/nem.2251
Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood
{"title":"Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files","authors":"Ziyu Qiu,&nbsp;Zhilei Zhou,&nbsp;Bradley Niblett,&nbsp;Andrew Johnston,&nbsp;Jeffrey Schwartzentruber,&nbsp;Nur Zincir-Heywood,&nbsp;Malcolm I. Heywood","doi":"10.1002/nem.2251","DOIUrl":"10.1002/nem.2251","url":null,"abstract":"<p>In terms of cyber security, log files represent a rich source of information regarding the state of a computer service/system. Automating the process of summarizing log file content represents an important aid for decision-making, especially given the 24/7 nature of network/service operations. We perform benchmarking over eight distinct log files in order to assess the impact of the following: (1) different embedding methods for developing semantic descriptions of the original log files, (2) applying dimension reduction to the high-dimensional semantic space, and (3) assessing the impact of using different unsupervised learning algorithms for providing a visual summary of the service state. Benchmarking demonstrates that (1) word-to-vector embeddings identified by bidirectional encoder representation from transformers (BERT) without “fine-tuning” are sufficient to match the performance of Bag-or-Words embeddings provided by term frequency-inverse document frequency (TF-IDF) and (2) the self-organizing map without dimension reduction provides the most effective anomaly detector.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2251","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136261798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability-aware virtual network function placement based on multidimensional universal generating functions 基于多维通用生成函数的可用性感知虚拟网络功能布局
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-10-24 DOI: 10.1002/nem.2252
Kengo Arakawa, Eiji Oki
{"title":"Availability-aware virtual network function placement based on multidimensional universal generating functions","authors":"Kengo Arakawa,&nbsp;Eiji Oki","doi":"10.1002/nem.2252","DOIUrl":"10.1002/nem.2252","url":null,"abstract":"<p>Network function virtualization (NFV) implements network functions as software, which enables flexible, resource-efficient, and rapid provision of network services. In NFV, network services are realized by the service function chain (SFC), which is a chain of virtual network functions (VNFs) linked in the proper order. Both availability and deployment cost are key concerns for network operators providing network services as SFC. This paper proposes a flexible VNF placement model on a per-VNF instance basis that minimizes deployment costs while satisfying availability requirements that may be placed on SFC. This paper uses a multidimensional universal generating function (MUGF) method, which is a multistate system analysis method, to compute the availability of a multistate SFC system with multiple VNFs coexisting on a server. The MUGF method calculates the performance of the entire SFC by combining the performance of servers as determined by applying a continuous-time Markov chain. To reduce the time to compute the SFC availability, we introduce operators to be applied to MUGF and develop an availability computing method. In addition, a heuristic algorithm for determining VNF placement targeting the lowest deployment cost possible while meeting availability requirements is presented. Numerical results show that the proposed model obtains VNF placement with lower cost than the conventional model in all examined cases. The proposed model achieves VNF placement at 58.5%–75.0% of the deployment cost of the conventional model for the same SFC availability requirements.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimal hybrid cascade regional convolutional network for cyberattack detection 一种用于网络攻击检测的最优混合级联区域卷积网络
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-09-04 DOI: 10.1002/nem.2247
Ali Alqahtani, Surbhi Bhatia Khan
{"title":"An optimal hybrid cascade regional convolutional network for cyberattack detection","authors":"Ali Alqahtani,&nbsp;Surbhi Bhatia Khan","doi":"10.1002/nem.2247","DOIUrl":"10.1002/nem.2247","url":null,"abstract":"<p>Cyber-physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information and communication technologies (ICTs) are integrated with urban systems. However, the large number of sensors in a smart city generates a significant amount of delicate data, like medical records, credit card numerics, and location coordinates, which are transported across a network to data centers for analysis and processing. This makes smart cities vulnerable to cyberattacks because of the resource constraints of their technology infrastructure. Applications for smart cities pose many security challenges, such as zero-day attacks resulting from exploiting weaknesses in various protocols. Therefore, this paper proposes an optimal hybrid transit search-cascade regional convolutional neural network (hybrid TS-Cascade R-CNN) to detect cyberattacks. The proposed model combines the hybrid transit-search approach with the cascade regional convolutional neural network to create an optimal solution for cyberattack detection. The cascade regional convolutional network uses a hybrid transit search algorithm to enhance the effectiveness of cyberattack detection. By integrating these two approaches, the system can leverage both global traffic patterns and local indicators to improve the accuracy of attack detection. During the training process, the proposed model recognizes and classifies malicious input even in the presence of sophisticated attacks. Finally, the experimental analysis is carried out for various attacks based on different metrics. The accuracy rate attained by the proposed approach is 99.2%, which is acceptable according to standards.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43887196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things 学习驱动的泛在移动边缘计算:未来一代物联网的网络管理挑战
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-09-03 DOI: 10.1002/nem.2250
Praveen Kumar Donta, Edmundo Monteiro, Chinmaya Kumar Dehury, Ilir Murturi
{"title":"Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things","authors":"Praveen Kumar Donta,&nbsp;Edmundo Monteiro,&nbsp;Chinmaya Kumar Dehury,&nbsp;Ilir Murturi","doi":"10.1002/nem.2250","DOIUrl":"10.1002/nem.2250","url":null,"abstract":"<p>Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.</p><p>This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.</p><p>The first paper <i>Ravi et al.</i> proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49500545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment 基于区块链的数据重复删除,在云环境中使用新颖的内容定义分块算法
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-08-31 DOI: 10.1002/nem.2249
Jabin Prakash J, Ramesh K, Saravanan K, Lakshmi Prabha G
{"title":"Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment","authors":"Jabin Prakash J,&nbsp;Ramesh K,&nbsp;Saravanan K,&nbsp;Lakshmi Prabha G","doi":"10.1002/nem.2249","DOIUrl":"10.1002/nem.2249","url":null,"abstract":"<p>The cloud environment is inherently dynamic as users are added immensely in a short duration. It is indeed difficult to manage such user profiles and associated data. Meanwhile, the cloud data expand at a twofold-to-threefold rate on average, making storage space management and data integrity maintenance a mandatory task but also risky. The main approaches for addressing these data maintenance challenges in a cloud context are deduplication and data protection. In order to manage storage space, finding and removing identical copies of the same data from the cloud are possible, resulting in a reduction in the amount of storage space needed. Furthermore, duplicate copies are considerably reduced in cloud storage owing to data deduplication. Here, a decentralized ledger public blockchain network is introduced to protect the Integrity of data stored in cloud storage. This research proposes data deduplication using speedy content-defined Chunking (SpeedyCDC) algorithm in the public blockchain. Many people and businesses outsource sensitive data to remote cloud servers because it considerably eliminates the hassle of managing software and infrastructure. However, the ownership and control rights of users data are nonetheless divided because it is outsourced to cloud storage providers (CSPs) and kept on a distant cloud. As a result, users have a great deal of difficulty in verifying the Integrity of sensitive data. Analysis using datasets from Geospatial Information Systems (GIS) revealed that the throughput increased by 5%–6% over that of the fastCDC technique, which offered Integrity since a blockchain network secured it.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46600210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system Fog‐Sec:使用许可的区块链系统在启用Fog的物联网网络中进行安全的端到端通信
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-08-28 DOI: 10.1002/nem.2248
Erukala Suresh Babu, Mekala Srinivasa Rao, Gandharba Swain, A. Kousar Nikhath, Rajesh Kaluri
{"title":"Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system","authors":"Erukala Suresh Babu,&nbsp;Mekala Srinivasa Rao,&nbsp;Gandharba Swain,&nbsp;A. Kousar Nikhath,&nbsp;Rajesh Kaluri","doi":"10.1002/nem.2248","DOIUrl":"10.1002/nem.2248","url":null,"abstract":"<p>The technological integration of the Internet of Things (IoT)-Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT-Fog-Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog-enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog-enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog-enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog-based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device-to-device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state-of-the-art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48696567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA 雾计算开箱即用:使用TOSCA动态部署雾服务容器
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-08-24 DOI: 10.1002/nem.2246
Suvam Basak, Satish Narayana Srirama
{"title":"Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA","authors":"Suvam Basak,&nbsp;Satish Narayana Srirama","doi":"10.1002/nem.2246","DOIUrl":"10.1002/nem.2246","url":null,"abstract":"<p>The conventional cloud-centric Internet of Things (IoT) application fails to meet the latency requirement of time-critical applications. The idea of edge and fog computing arrived to distribute workloads across the fog devices located in the local area. However, achieving seamless interoperability, platform independence, and automatic deployment of services becomes the major challenge over heterogeneous fog devices. This paper proposes an integrated and standards-based fog computing federation framework, FogDEFT, that adapts OASIS–Topology and Orchestration Specification for Cloud Applications (TOSCA) for service deployment in fog. The framework standardizes the distributed application design with TOSCA Service Template to deploy Docker Containers in Swarm mode and manages interoperability over heterogeneous fog devices. The framework uses a lightweight TOSCA compliant orchestrator to dynamically deploy various fog applications (user-developed services) on the fly.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43098814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load balancing clustering and routing for IoT-enabled wireless sensor networks 支持物联网的无线传感器网络负载均衡集群和路由
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-07-24 DOI: 10.1002/nem.2244
Shashank Singh, Veena Anand
{"title":"Load balancing clustering and routing for IoT-enabled wireless sensor networks","authors":"Shashank Singh,&nbsp;Veena Anand","doi":"10.1002/nem.2244","DOIUrl":"10.1002/nem.2244","url":null,"abstract":"<p>Internet of things (IoT) devices are equipped with a number of interconnected sensor nodes that relies on ubiquitous connectivity between sensor devices to optimize information automation processes. Because of the extensive deployments in adverse areas and unsupervised nature of wireless sensor networks (WSNs), energy efficiency is a significant aim in these networks. Network survival time can be extended by optimizing its energy consumption. It has been a complex struggle for researchers to develop energy-efficient routing protocols in the field of WSNs. Energy consumption, path reliability and Quality of Service (QoS) in WSNs became important factors to be focused on enforcing an efficient routing strategy. A hybrid optimization technique presented in this paper is a combination of fuzzy c-means and Grey Wolf optimization (GWO) techniques for clustering. The proposed scheme was evaluated on different parameters such as total energy consumed, packet delivery ratio, packet drop rate, throughput, delay, remaining energy and total network lifetime. According to the results of the simulation, the proposed scheme improves energy efficiency and throughput by about 30% and packet delivery ratio and latency by about 10%, compared with existing protocols such as Chemical Reaction Approach based Cluster Formation (CHRA), Hybrid Optimal Based Cluster Formation (HOBCF), GWO-based clustering (GWO-C) and Cat Swarm Optimization based Energy-Efficient Reliable sectoring Scheme with prediction algorithms (P_CSO_EERSS). The study concludes that the protocol suitable for creating IoT monitoring system network lifetime is an important criteria.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41802986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges 基于区块链的不可替代代币调查:历史、技术、标准和公开挑战
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-07-19 DOI: 10.1002/nem.2245
Kyungchan Ko, Taeyeol Jeong, Jongsoo Woo, James Won-Ki Hong
{"title":"Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges","authors":"Kyungchan Ko,&nbsp;Taeyeol Jeong,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2245","DOIUrl":"10.1002/nem.2245","url":null,"abstract":"<p>This paper presents a survey of non-fungible tokens (NFTs), including its history, technologies, standards, and challenges in their development. An NFT is a unique digital entity that is created and maintained using blockchain technology. Each NFT is identified using a unique smart contract and a token ID, so the whole history of the NFT can be globally identified by its address and token ID. The blockchain information indelibly identifies the current owner of any asset, previous owners, and original creator. NFTs are used to manage ownership of digital and physical assets and cryptocurrencies. The prices of popular NFTs have become very high, and the market for them has overheated in recent years. NFT technology and its ecosystem have evolved since Quantum, the first NFT, was stored in the Namecoin blockchain. Ethereum has become the main platform for NFT projects because it provides support for smart contracts. Currently, almost all NFT projects are launched on the Ethereum blockchain. NFT has two major standards called ERC-721 and ERC-1155, which have had important functions in the development of NFT. Starting with these two standards, other standards for NFT continue to emerge; they expand the functionality of NFT such as by adding utility. However, NFT is a very early technology, and it has not been long after the NFT concept was created and used. So there are several challenges for further improving NFT technology, in terms of usability, interoperability, and evolution. This paper presents a survey of NFT, including its history, technologies, standards, and challenges of NFT.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43978855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing 移动边缘计算中使用强化学习和马尔可夫决策过程的安全数据卸载
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2023-06-27 DOI: 10.1002/nem.2243
Jitendra Kumar Samriya, Mohit Kumar, Sukhpal Singh Gill
{"title":"Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing","authors":"Jitendra Kumar Samriya,&nbsp;Mohit Kumar,&nbsp;Sukhpal Singh Gill","doi":"10.1002/nem.2243","DOIUrl":"10.1002/nem.2243","url":null,"abstract":"<p>Mobile Internet services are developing rapidly for several applications based on computational ability such as augmented/virtual reality, vehicular networks, etc. The mobile terminals are enabled using mobile edge computing (MEC) for offloading the task at the edge of the cellular networks, but offloading is still a challenging issue due to the dynamism, and uncertainty of upcoming IoT requests and wireless channel state. Moreover, securing the offloading data enhanced the challenges of computational complexities and required a secure and efficient offloading technique. To tackle the mentioned issues, a reinforcement learning-based Markov decision process offloading model is proposed that optimized energy efficiency, and mobile users' time by considering the constrained computation of IoT devices, moreover guarantees efficient resource sharing among multiple users. An advanced encryption standard is employed in this work to fulfil the requirements of data security. The simulation outputs reveal that the proposed approach surpasses the existing baseline models for offloading overhead and service cost QoS parameters ensuring secure data offloading.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45078477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信