V. Karthik, R. Lakshmi, Salini Abraham, M. Ramkumar
{"title":"Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network","authors":"V. Karthik, R. Lakshmi, Salini Abraham, M. Ramkumar","doi":"10.1002/nem.2256","DOIUrl":"10.1002/nem.2256","url":null,"abstract":"<p>Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive review of blockchain integration in remote patient monitoring for E-health","authors":"Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane","doi":"10.1002/nem.2254","DOIUrl":"10.1002/nem.2254","url":null,"abstract":"<p>The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the <i>game-changing</i> power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology analysis of the Ripple transaction network","authors":"Anan Jin, Yuhang Ye, Brian Lee, Yuansong Qiao","doi":"10.1002/nem.2253","DOIUrl":"10.1002/nem.2253","url":null,"abstract":"<p>The Ripple network is one typical blockchain-based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding on the characteristics of the payment networks while optimizing the network design and transaction routing. This paper presents a comprehensive analysis to the Ripple transaction network, including two subnets formed by the two key functionalities, that is, Ripple Direct Payment Network (RDPN) and Ripple Credit Payment Network (RCPN). The analysis is performed with different network metrics, including clustering coefficient, centrality, and so on. Furthermore, this paper provides an in-depth analysis on the node degrees and edge weights, which reflect the number of transacted accounts of an account and the number of transactions between two accounts. The results show that the network is highly imbalanced and concentrated with a few nodes and edges holding most of the resources. Moreover, RDPN and RCPN show different characteristics in terms of transmitted and received transactions, the senders are more concentrated in RDPN, whereas in RCPN, the receivers are more concentrated.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood
{"title":"Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files","authors":"Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood","doi":"10.1002/nem.2251","DOIUrl":"10.1002/nem.2251","url":null,"abstract":"<p>In terms of cyber security, log files represent a rich source of information regarding the state of a computer service/system. Automating the process of summarizing log file content represents an important aid for decision-making, especially given the 24/7 nature of network/service operations. We perform benchmarking over eight distinct log files in order to assess the impact of the following: (1) different embedding methods for developing semantic descriptions of the original log files, (2) applying dimension reduction to the high-dimensional semantic space, and (3) assessing the impact of using different unsupervised learning algorithms for providing a visual summary of the service state. Benchmarking demonstrates that (1) word-to-vector embeddings identified by bidirectional encoder representation from transformers (BERT) without “fine-tuning” are sufficient to match the performance of Bag-or-Words embeddings provided by term frequency-inverse document frequency (TF-IDF) and (2) the self-organizing map without dimension reduction provides the most effective anomaly detector.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2251","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136261798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Availability-aware virtual network function placement based on multidimensional universal generating functions","authors":"Kengo Arakawa, Eiji Oki","doi":"10.1002/nem.2252","DOIUrl":"10.1002/nem.2252","url":null,"abstract":"<p>Network function virtualization (NFV) implements network functions as software, which enables flexible, resource-efficient, and rapid provision of network services. In NFV, network services are realized by the service function chain (SFC), which is a chain of virtual network functions (VNFs) linked in the proper order. Both availability and deployment cost are key concerns for network operators providing network services as SFC. This paper proposes a flexible VNF placement model on a per-VNF instance basis that minimizes deployment costs while satisfying availability requirements that may be placed on SFC. This paper uses a multidimensional universal generating function (MUGF) method, which is a multistate system analysis method, to compute the availability of a multistate SFC system with multiple VNFs coexisting on a server. The MUGF method calculates the performance of the entire SFC by combining the performance of servers as determined by applying a continuous-time Markov chain. To reduce the time to compute the SFC availability, we introduce operators to be applied to MUGF and develop an availability computing method. In addition, a heuristic algorithm for determining VNF placement targeting the lowest deployment cost possible while meeting availability requirements is presented. Numerical results show that the proposed model obtains VNF placement with lower cost than the conventional model in all examined cases. The proposed model achieves VNF placement at 58.5%–75.0% of the deployment cost of the conventional model for the same SFC availability requirements.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal hybrid cascade regional convolutional network for cyberattack detection","authors":"Ali Alqahtani, Surbhi Bhatia Khan","doi":"10.1002/nem.2247","DOIUrl":"10.1002/nem.2247","url":null,"abstract":"<p>Cyber-physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information and communication technologies (ICTs) are integrated with urban systems. However, the large number of sensors in a smart city generates a significant amount of delicate data, like medical records, credit card numerics, and location coordinates, which are transported across a network to data centers for analysis and processing. This makes smart cities vulnerable to cyberattacks because of the resource constraints of their technology infrastructure. Applications for smart cities pose many security challenges, such as zero-day attacks resulting from exploiting weaknesses in various protocols. Therefore, this paper proposes an optimal hybrid transit search-cascade regional convolutional neural network (hybrid TS-Cascade R-CNN) to detect cyberattacks. The proposed model combines the hybrid transit-search approach with the cascade regional convolutional neural network to create an optimal solution for cyberattack detection. The cascade regional convolutional network uses a hybrid transit search algorithm to enhance the effectiveness of cyberattack detection. By integrating these two approaches, the system can leverage both global traffic patterns and local indicators to improve the accuracy of attack detection. During the training process, the proposed model recognizes and classifies malicious input even in the presence of sophisticated attacks. Finally, the experimental analysis is carried out for various attacks based on different metrics. The accuracy rate attained by the proposed approach is 99.2%, which is acceptable according to standards.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43887196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning-driven ubiquitous mobile edge computing: Network management challenges for future generation Internet of Things","authors":"Praveen Kumar Donta, Edmundo Monteiro, Chinmaya Kumar Dehury, Ilir Murturi","doi":"10.1002/nem.2250","DOIUrl":"10.1002/nem.2250","url":null,"abstract":"<p>Ubiquitous edge computing facilitates efficient cloud services near mobile devices, enabling mobile edge computing (MEC) to offer services more efficiently by presenting storage and processing capability within the proximity of mobile devices and in general IoT domains. However, compared with conventional mobile cloud computing, ubiquitous MEC introduces numerous complex challenges due to the heterogeneous smart devices, network infrastructures, and limited transmission bandwidth. Processing and managing such massive volumes of data generated from these devices is complex and challenging in edge infrastructures. On the other side, time-critical applications have stringent requirements such as ultra-low-latency, energy cost, mobility, resource, and security issues that cannot be neglected. For example, smart healthcare or industrial networks generate emergency information very frequently (i.e., often in terms of milliseconds), which needs to be processed near the sensing devices with minimal processing delay. In this context, future generation IoT requires robust and intelligent network management approaches that can handle the system complexity (e.g., scalability and orchestration) with little or no little human intervention and offer a better service to end-users. More precisely, AI/ML approaches designed explicitly for networks under high traffic volume of data help overcome several management challenges, such as (i) improving performance by balancing load and traffic, (ii) distributing the bandwidth spectrum based on demand, and (iii) traffic predictions. Moreover, this need also opens several new research directions such as new MEC architecture, service provisioning technique, security mechanisms, advanced 5G or beyond communication technology, ambient intelligence, and AI/ML-based solutions.</p><p>This issue collect surveys and contribution articles on emerging trends and technologies in ubiquitous MEC for future generation IoT networks and their managements. The papers related to machine learning, deep learning, optimization, blockchain, 5G, or beyond solutions, especially for domain-specific IoT network management, which use MEC environments, are collected after evaluating the review process. Each paper submitted to this special issue was reviewed by three to seven experts during the assessment process. At the end we consider one survey paper and four research contributions.</p><p>The first paper <i>Ravi et al.</i> proposed a survey on “Stochastic modeling and performance analysis in balancing load and traffic for vehicular ad hoc networks.” This survey presents recently published stochastic modeling-based algorithms for VANETs. This article briefly covers various queueing models for the reader's convenience. This paper discusses a variety of VANET issues such as mobility, routing, data dissemination, cooperative communication, congestion control, and traffic load balancing issues addressed by stochastic modeling techniques. The authors","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49500545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jabin Prakash J, Ramesh K, Saravanan K, Lakshmi Prabha G
{"title":"Blockchain-based data deduplication using novel content-defined chunking algorithm in cloud environment","authors":"Jabin Prakash J, Ramesh K, Saravanan K, Lakshmi Prabha G","doi":"10.1002/nem.2249","DOIUrl":"10.1002/nem.2249","url":null,"abstract":"<p>The cloud environment is inherently dynamic as users are added immensely in a short duration. It is indeed difficult to manage such user profiles and associated data. Meanwhile, the cloud data expand at a twofold-to-threefold rate on average, making storage space management and data integrity maintenance a mandatory task but also risky. The main approaches for addressing these data maintenance challenges in a cloud context are deduplication and data protection. In order to manage storage space, finding and removing identical copies of the same data from the cloud are possible, resulting in a reduction in the amount of storage space needed. Furthermore, duplicate copies are considerably reduced in cloud storage owing to data deduplication. Here, a decentralized ledger public blockchain network is introduced to protect the Integrity of data stored in cloud storage. This research proposes data deduplication using speedy content-defined Chunking (SpeedyCDC) algorithm in the public blockchain. Many people and businesses outsource sensitive data to remote cloud servers because it considerably eliminates the hassle of managing software and infrastructure. However, the ownership and control rights of users data are nonetheless divided because it is outsourced to cloud storage providers (CSPs) and kept on a distant cloud. As a result, users have a great deal of difficulty in verifying the Integrity of sensitive data. Analysis using datasets from Geospatial Information Systems (GIS) revealed that the throughput increased by 5%–6% over that of the fastCDC technique, which offered Integrity since a blockchain network secured it.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46600210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system","authors":"Erukala Suresh Babu, Mekala Srinivasa Rao, Gandharba Swain, A. Kousar Nikhath, Rajesh Kaluri","doi":"10.1002/nem.2248","DOIUrl":"10.1002/nem.2248","url":null,"abstract":"<p>The technological integration of the Internet of Things (IoT)-Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT-Fog-Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog-enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog-enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog-enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog-based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device-to-device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state-of-the-art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48696567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA","authors":"Suvam Basak, Satish Narayana Srirama","doi":"10.1002/nem.2246","DOIUrl":"10.1002/nem.2246","url":null,"abstract":"<p>The conventional cloud-centric Internet of Things (IoT) application fails to meet the latency requirement of time-critical applications. The idea of edge and fog computing arrived to distribute workloads across the fog devices located in the local area. However, achieving seamless interoperability, platform independence, and automatic deployment of services becomes the major challenge over heterogeneous fog devices. This paper proposes an integrated and standards-based fog computing federation framework, FogDEFT, that adapts OASIS–Topology and Orchestration Specification for Cloud Applications (TOSCA) for service deployment in fog. The framework standardizes the distributed application design with TOSCA Service Template to deploy Docker Containers in Swarm mode and manages interoperability over heterogeneous fog devices. The framework uses a lightweight TOSCA compliant orchestrator to dynamically deploy various fog applications (user-developed services) on the fly.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43098814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}