T. Theodoropoulos, Antonios Makris, Abderrahmane Boudi, T. Taleb, U. Herzog, Luis Rosa, Luís Cordeiro, K. Tserpes, Elena Spatafora, Alessandro Romussi, E. Zschau, Manos N. Kamarianakis, Antonis I Protopsaltis, G. Papagiannakis, Patrizio Dazzi
{"title":"Cloud-based XR Services: A Survey on Relevant Challenges and Enabling Technologies","authors":"T. Theodoropoulos, Antonios Makris, Abderrahmane Boudi, T. Taleb, U. Herzog, Luis Rosa, Luís Cordeiro, K. Tserpes, Elena Spatafora, Alessandro Romussi, E. Zschau, Manos N. Kamarianakis, Antonis I Protopsaltis, G. Papagiannakis, Patrizio Dazzi","doi":"10.33969/j-nana.2022.020101","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020101","url":null,"abstract":"In recent years, the emergence of XR (eXtended Reality) applications, including Holography, Augmented, Virtual and Mixed Reality, has resulted in the creation of rather demanding requirements for Quality of Experience (QoE) and Quality of Service (QoS). In order to cope with requirements such as ultra-low latency and increased bandwidth, it is of paramount importance to leverage certain technological paradigms. The purpose of this paper is to identify these QoE and QoS requirements and then to provide an extensive survey on technologies that are able to facilitate the rather demanding requirements of Cloud-based XR Services. To that end, a wide range of enabling technologies are explored. These technologies include e.g. the ETSI (European Telecommunications Standards Institute) Multi-Access Edge Computing (MEC), Edge Storage, the ETSI Management and Orchestration (MANO), the ETSI Zero touch network & Service Management (ZSM), Deterministic Networking, the 3GPP (3rd Generation Partnership Project) Media Streaming, MPEG’s (Moving Picture Experts Group) Mixed and Augmented Reality standard, the Omnidirectional MediA Format (OMAF), ETSI’s Augmented Reality Framework etc.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kenan Qin, Mengfan Xu, Bello Ahmad Muhammad, Jing Han
{"title":"MTAD RF: Multivariate Time-series Anomaly Detection based on Reconstruction and Forecast","authors":"Kenan Qin, Mengfan Xu, Bello Ahmad Muhammad, Jing Han","doi":"10.33969/j-nana.2023.030105","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030105","url":null,"abstract":"Anomaly detection in multivariate time series is an important research direction, which helps to improve the security of industrial systems by detecting abnormally unreliable devices. Multivariate time series (MTS) anomalies not only need to pay attention to the time correlation between different time series but also need to consider the abnormal changes in the relationship between different variables. Once the influence relationship between two variables that influence each other is ignored, it will likely lead to false positives or false positives. At the same time, the degree of influence between different time series or different features is also inconsistent, just like what happened recently have radically different influences on the present. Furthermore, most of the existing models are weak in detecting no abnormality. To tackle these issues, in this paper, we propose a new model of multivariate time series anomaly detection based on reconstruction and forecast, named MTAD RF. First, we capture the temporal and feature correlations of MTS through two parallel GAT layers, and at the same time distinguish the influence degree between different time series or different features based on attention coefficients. Second, we leverage the generative power of VAE and the single-step forecast power of MLP to jointly detect known and unknown anomalies based on reconstructed and predicted models. Major practical implications of the proposed approach is missing. Finally, anomalies are detected and explained based on temporal and feature anomaly scores. Experiments demonstrate that our model outperforms current state-of-the-art methods on 4 real-world datasets, with an average F1 score of about 95% and excellent anomaly diagnostic ability.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covert Communications in Satellite Internet: A Survey","authors":"Zewei Guo, Ji He, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang","doi":"10.33969/j-nana.2022.020304","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020304","url":null,"abstract":"The broadcast nature of wireless channels and broad coverage brings significant challenges to the security of Satellite Internet. Recently, a new security paradigm named covert communication aims to enhance security by hiding the transmission process and has received great research attention. Various covert transmission schemes were proposed to achieve covertness for different network scenarios. Motivated by the importance of promising security techniques, this survey provides a comprehensive overview of the recent works on covert communication in Satellite Internet for the first time. We first introduce the basic architecture and characteristics of Satellite Internet, as well as its access security challenges. Then, an in-depth overview of covert communication technologies is provided with an emphasis, which is divided into two categories, i.e., traditional ones and information theory-based ones. Finally, several key challenges and future research directions on covert communication are presented.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Allocation for Covert Communications in Cellular-Enabled UAV Networks: A Deep Reinforcement Learning Approach","authors":"Xinzhe Pi, Bin Yang","doi":"10.33969/j-nana.2022.020302","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020302","url":null,"abstract":"This paper investigates the covert communications via spectrum allocations in a cellular-enabled unmanned aerial vehicle (UAV) network consisting of a base station (BS), UAVs, ground users (GUs), and a warden, where warden attempts to detect the transmission from a target GU to a UAV receiver. We formulate the spectrum allocation as an optimization problem with the constraints of covertness performance requirement and the qualities of service (QoS) of cellular communications. This is a nonlinear and nonconvex problem, which is generally challenging to be solved. Thus, we propose a deep reinforcement learning (DRL) approach to solve it. Under such an approach, we first model the multi-agent DRL environment in such networks. Then we define the state, action, reward and interaction mechanism of the DRL environment. Finally, a DRL algorithm is presented for learning the optimal policy of spectrum allocation.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing YOLOv5 algorithm for Mask-wearing Detection","authors":"Yang Fan, Wu Wang","doi":"10.33969/j-nana.2023.030201","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030201","url":null,"abstract":"The novel coronavirus has a strong ability to spread and survive. Wearing a mask correctly can effectively reduce the spread of the virus among the crowd. How to intelligently and efficiently detect the wearing of a mask is of great significance. Detecting whether to wear a mask is the target detection content that many researchers are currently studying. YOLOv5 (You Only Look Once) is an excellent algorithm in target detection. Given that detecting whether a mask is worn is different from other target detection tasks, in this paper, we tried to optimize YOLOv5 algorithm to make it more suitable for mask-wearing detection. In words, detection layers, attention mechanism were added, and proper loss function was chosen strictly to the YOLOv5 target detection algorithm. So that optimal YOLOv5 algorithm model was proposed. The accuracy rate (precision), recall rate (recall) and average precision (mAP) of the algorithm on the test set were 83%, 83.3% and 81.7% respectively, higher than YOLOv3, YOLOv4, YOLOv5 detection algorithm.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on IRS-assisted Communications: Problems, Challenges, and Solutions","authors":"Yuyan Liu, Haoran Mei","doi":"10.33969/j-nana.2022.020401","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020401","url":null,"abstract":"This paper studies the Intelligent reflecting surface (IRS)-based communications, including the fixed and UAV-mounted IRSs. IRSs can be deployed in locations that are difficult to receive or transmit signals due to obstacles or remote areas by passively reflecting the signals received from base stations (BSs). The IRSs can reflect signals in the designed way to enhance the transmitted signal or enable line-of-sight (LOS) communications. They can be fixed on the side of high buildings to reflect signals or mounted on the UAVs to provide temporary wireless communications in the remote areas. This paper conducts an overview on IRS-based communications including the existing problems, challenges, and possible solutions.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127305829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Age of information: in Systems with Multi-source, Limited Buffers, and LCFS-S","authors":"Kangrui Li, Xiang Ji, Zicong Huang, Shujie Yang","doi":"10.33969/j-nana.2023.030104","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030104","url":null,"abstract":"In recent years, an increasing number of real-time applications have become more sensitive to the freshness of information, which requires that packets reach the receiver as promptly as possible. As a measure of information freshness, it is of great interest to measure the age of information (AoI) on multi-source networks. In this paper, we propose a new queueing system: the systems with N sources, Single buffer, Non-source-aware, and LCFS-S (NSLS-Q system). To simplify the study, we first studied the queueing system for Two sources, Single buffer, Non-source-aware, and LCFS-S (TSLS-Q system). We then generalize the conclusions to the NSLS-Q system. We model the queueing system using a stochastic hybrid system (SHS) to solve for the age of information in the queueing system. In this, Markov chains are used to represent the state transitions. We then compared the system with other queueing systems through numerical results. The results show that the queue model performs better in terms of AoI compared to the traditional queue model.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130535397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Least Significant Bit Steganographic Method Using Hough Transform Technique","authors":"D. Nashat, Loay Mamdouh","doi":"10.33969/j-nana.2023.030203","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030203","url":null,"abstract":"Steganography is a data-hiding scientific branch that aims to hide secret data in an image, video, or audio. Image steganography methods try to embed a large amount of data into images with high imperceptibility. However, increasing the number of embedded data in the image decreases its quality. Therefore, in this paper, a new method based on Least Significant Bit (LSB) using Hough Transform is proposed to improve the stego image quality with increasing the amount of embedded data. The LSB is the common embedding steganography method due to its simplicity of implementation and low complexity. The proposed method inverts the LSBs of image pixels to enhance the quality of stego image. First, improved edge detection filter is used to detect edges areas. Then, we invert LSBs for the pixel in edge area pixels. Finally, the LSBs smooth area pixels of the cover image are inverted. The performance of the presented method is evaluated for the stego image quality and the amount of embedded data. The results show that the new method has better performance in comparison with the current methods in terms of Peak Signal-to-Noise Ratio (PSNR) and capacity.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Distributed Denial of Service Flooding Attack Using Odds Ratio","authors":"D. Nashat, Fatma A. Hussain, Xiaohong Jiang","doi":"10.33969/j-nana.2021.010204","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010204","url":null,"abstract":"Computer networks are vulnerable to many types of attacks while the Distributed Denial of Service attack (DDoS) serves as one of the top concerns for security professionals. The DDoS flooding attack denies the services by consuming the server resources to prevent the legitimate users from using their desired services. The hardness of detecting this attack lies in sending a stream of packets to the server with spoofed IP addresses, so that the internet routing infrastructure cannot distinguish the spoofed packets. Based on the odds ratio (OR) statistical measurement, in this work we propose a new detection method for the DDoS flooding attacks. By exploring the odds ratio to determine the risk factor of any incoming traffic to the server, the legitimate and attack traffic packets can be easily differentiated. Experimental results demonstrate the efficiency of the presented detection method in terms of its detection probability and detection time.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130953759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ReSQ: Reinforcement Learning-Based Queue Allocation in Software-Defined Queuing Framework","authors":"Ilora Maity, T. Taleb","doi":"10.33969/j-nana.2022.020402","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020402","url":null,"abstract":"With the evolution of 5G networks, the demand for Ultra-Reliable Low Latency Communications (URLLC) services is increasing. Software-Defined Networking (SDN) offers flexible network management to prioritize URLLC services coexisting with best-effort traffic. Utilizing the network programmability feature of SDN, Software-Defined Queueing (SDQ) framework selects the optimal output port queue on forwarding devices and routing path for incoming traffic flows to provide deterministic Quality of Service (QoS) support required for URLLC traffic. However, in the existing SDQ framework, the selections of optimal queue and path are done manually by observing the traffic type of each incoming flow, the available bandwidth of each potential routing path, and the status of output port queues of each forwarding device on each potential routing path. The static allocations of path and queue for each flow are inefficient to provide a deterministic QoS guarantee for a high volume of incoming traffic which is typical in 5G networks. The limited buffer availability on the forwarding devices is another constraint regarding optimal queue allocation that ensures an end-to-end (E2E) delay guarantee. To address these challenges, in this paper, we extend the SDQ framework by automating queue management with a reinforcement learning (RL)-based approach. The proposed queue management approach considers diverse QoS demands as well as a limited buffer on the forwarding devices and performs prioritized queue allocation. Our approach also includes a hash-based flow grouping to handle a high volume of traffic having diverse latency demands and a path selection mechanism based on available bandwidth and hop count. The simulation result shows that the proposed scheme ReSQ reduces the QoS violation ratio by 10.45% as compared to the baseline scheme that selects queues randomly.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}