Journal of Networking and Network Applications最新文献

筛选
英文 中文
Cloud-based XR Services: A Survey on Relevant Challenges and Enabling Technologies 基于云的XR服务:相关挑战和使能技术调查
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020101
T. Theodoropoulos, Antonios Makris, Abderrahmane Boudi, T. Taleb, U. Herzog, Luis Rosa, Luís Cordeiro, K. Tserpes, Elena Spatafora, Alessandro Romussi, E. Zschau, Manos N. Kamarianakis, Antonis I Protopsaltis, G. Papagiannakis, Patrizio Dazzi
{"title":"Cloud-based XR Services: A Survey on Relevant Challenges and Enabling Technologies","authors":"T. Theodoropoulos, Antonios Makris, Abderrahmane Boudi, T. Taleb, U. Herzog, Luis Rosa, Luís Cordeiro, K. Tserpes, Elena Spatafora, Alessandro Romussi, E. Zschau, Manos N. Kamarianakis, Antonis I Protopsaltis, G. Papagiannakis, Patrizio Dazzi","doi":"10.33969/j-nana.2022.020101","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020101","url":null,"abstract":"In recent years, the emergence of XR (eXtended Reality) applications, including Holography, Augmented, Virtual and Mixed Reality, has resulted in the creation of rather demanding requirements for Quality of Experience (QoE) and Quality of Service (QoS). In order to cope with requirements such as ultra-low latency and increased bandwidth, it is of paramount importance to leverage certain technological paradigms. The purpose of this paper is to identify these QoE and QoS requirements and then to provide an extensive survey on technologies that are able to facilitate the rather demanding requirements of Cloud-based XR Services. To that end, a wide range of enabling technologies are explored. These technologies include e.g. the ETSI (European Telecommunications Standards Institute) Multi-Access Edge Computing (MEC), Edge Storage, the ETSI Management and Orchestration (MANO), the ETSI Zero touch network & Service Management (ZSM), Deterministic Networking, the 3GPP (3rd Generation Partnership Project) Media Streaming, MPEG’s (Moving Picture Experts Group) Mixed and Augmented Reality standard, the Omnidirectional MediA Format (OMAF), ETSI’s Augmented Reality Framework etc.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
MTAD RF: Multivariate Time-series Anomaly Detection based on Reconstruction and Forecast MTAD RF:基于重构和预测的多变量时间序列异常检测
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2023.030105
Kenan Qin, Mengfan Xu, Bello Ahmad Muhammad, Jing Han
{"title":"MTAD RF: Multivariate Time-series Anomaly Detection based on Reconstruction and Forecast","authors":"Kenan Qin, Mengfan Xu, Bello Ahmad Muhammad, Jing Han","doi":"10.33969/j-nana.2023.030105","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030105","url":null,"abstract":"Anomaly detection in multivariate time series is an important research direction, which helps to improve the security of industrial systems by detecting abnormally unreliable devices. Multivariate time series (MTS) anomalies not only need to pay attention to the time correlation between different time series but also need to consider the abnormal changes in the relationship between different variables. Once the influence relationship between two variables that influence each other is ignored, it will likely lead to false positives or false positives. At the same time, the degree of influence between different time series or different features is also inconsistent, just like what happened recently have radically different influences on the present. Furthermore, most of the existing models are weak in detecting no abnormality. To tackle these issues, in this paper, we propose a new model of multivariate time series anomaly detection based on reconstruction and forecast, named MTAD RF. First, we capture the temporal and feature correlations of MTS through two parallel GAT layers, and at the same time distinguish the influence degree between different time series or different features based on attention coefficients. Second, we leverage the generative power of VAE and the single-step forecast power of MLP to jointly detect known and unknown anomalies based on reconstructed and predicted models. Major practical implications of the proposed approach is missing. Finally, anomalies are detected and explained based on temporal and feature anomaly scores. Experiments demonstrate that our model outperforms current state-of-the-art methods on 4 real-world datasets, with an average F1 score of about 95% and excellent anomaly diagnostic ability.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114134243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Covert Communications in Satellite Internet: A Survey 卫星互联网中的秘密通信:综述
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020304
Zewei Guo, Ji He, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang
{"title":"Covert Communications in Satellite Internet: A Survey","authors":"Zewei Guo, Ji He, Yuanyu Zhang, Shuangrui Zhao, Yulong Shen, Xiaohong Jiang","doi":"10.33969/j-nana.2022.020304","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020304","url":null,"abstract":"The broadcast nature of wireless channels and broad coverage brings significant challenges to the security of Satellite Internet. Recently, a new security paradigm named covert communication aims to enhance security by hiding the transmission process and has received great research attention. Various covert transmission schemes were proposed to achieve covertness for different network scenarios. Motivated by the importance of promising security techniques, this survey provides a comprehensive overview of the recent works on covert communication in Satellite Internet for the first time. We first introduce the basic architecture and characteristics of Satellite Internet, as well as its access security challenges. Then, an in-depth overview of covert communication technologies is provided with an emphasis, which is divided into two categories, i.e., traditional ones and information theory-based ones. Finally, several key challenges and future research directions on covert communication are presented.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127749542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum Allocation for Covert Communications in Cellular-Enabled UAV Networks: A Deep Reinforcement Learning Approach 蜂窝式无人机网络隐蔽通信的频谱分配:一种深度强化学习方法
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020302
Xinzhe Pi, Bin Yang
{"title":"Spectrum Allocation for Covert Communications in Cellular-Enabled UAV Networks: A Deep Reinforcement Learning Approach","authors":"Xinzhe Pi, Bin Yang","doi":"10.33969/j-nana.2022.020302","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020302","url":null,"abstract":"This paper investigates the covert communications via spectrum allocations in a cellular-enabled unmanned aerial vehicle (UAV) network consisting of a base station (BS), UAVs, ground users (GUs), and a warden, where warden attempts to detect the transmission from a target GU to a UAV receiver. We formulate the spectrum allocation as an optimization problem with the constraints of covertness performance requirement and the qualities of service (QoS) of cellular communications. This is a nonlinear and nonconvex problem, which is generally challenging to be solved. Thus, we propose a deep reinforcement learning (DRL) approach to solve it. Under such an approach, we first model the multi-agent DRL environment in such networks. Then we define the state, action, reward and interaction mechanism of the DRL environment. Finally, a DRL algorithm is presented for learning the optimal policy of spectrum allocation.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing YOLOv5 algorithm for Mask-wearing Detection 基于YOLOv5算法的口罩检测优化
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2023.030201
Yang Fan, Wu Wang
{"title":"Optimizing YOLOv5 algorithm for Mask-wearing Detection","authors":"Yang Fan, Wu Wang","doi":"10.33969/j-nana.2023.030201","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030201","url":null,"abstract":"The novel coronavirus has a strong ability to spread and survive. Wearing a mask correctly can effectively reduce the spread of the virus among the crowd. How to intelligently and efficiently detect the wearing of a mask is of great significance. Detecting whether to wear a mask is the target detection content that many researchers are currently studying. YOLOv5 (You Only Look Once) is an excellent algorithm in target detection. Given that detecting whether a mask is worn is different from other target detection tasks, in this paper, we tried to optimize YOLOv5 algorithm to make it more suitable for mask-wearing detection. In words, detection layers, attention mechanism were added, and proper loss function was chosen strictly to the YOLOv5 target detection algorithm. So that optimal YOLOv5 algorithm model was proposed. The accuracy rate (precision), recall rate (recall) and average precision (mAP) of the algorithm on the test set were 83%, 83.3% and 81.7% respectively, higher than YOLOv3, YOLOv4, YOLOv5 detection algorithm.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114410435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on IRS-assisted Communications: Problems, Challenges, and Solutions irs辅助通信研究:问题、挑战和解决方案
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020401
Yuyan Liu, Haoran Mei
{"title":"A Study on IRS-assisted Communications: Problems, Challenges, and Solutions","authors":"Yuyan Liu, Haoran Mei","doi":"10.33969/j-nana.2022.020401","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020401","url":null,"abstract":"This paper studies the Intelligent reflecting surface (IRS)-based communications, including the fixed and UAV-mounted IRSs. IRSs can be deployed in locations that are difficult to receive or transmit signals due to obstacles or remote areas by passively reflecting the signals received from base stations (BSs). The IRSs can reflect signals in the designed way to enhance the transmitted signal or enable line-of-sight (LOS) communications. They can be fixed on the side of high buildings to reflect signals or mounted on the UAVs to provide temporary wireless communications in the remote areas. This paper conducts an overview on IRS-based communications including the existing problems, challenges, and possible solutions.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127305829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Age of information: in Systems with Multi-source, Limited Buffers, and LCFS-S 信息时代:多源、有限缓冲区和LCFS-S系统
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2023.030104
Kangrui Li, Xiang Ji, Zicong Huang, Shujie Yang
{"title":"Age of information: in Systems with Multi-source, Limited Buffers, and LCFS-S","authors":"Kangrui Li, Xiang Ji, Zicong Huang, Shujie Yang","doi":"10.33969/j-nana.2023.030104","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030104","url":null,"abstract":"In recent years, an increasing number of real-time applications have become more sensitive to the freshness of information, which requires that packets reach the receiver as promptly as possible. As a measure of information freshness, it is of great interest to measure the age of information (AoI) on multi-source networks. In this paper, we propose a new queueing system: the systems with N sources, Single buffer, Non-source-aware, and LCFS-S (NSLS-Q system). To simplify the study, we first studied the queueing system for Two sources, Single buffer, Non-source-aware, and LCFS-S (TSLS-Q system). We then generalize the conclusions to the NSLS-Q system. We model the queueing system using a stochastic hybrid system (SHS) to solve for the age of information in the queueing system. In this, Markov chains are used to represent the state transitions. We then compared the system with other queueing systems through numerical results. The results show that the queue model performs better in terms of AoI compared to the traditional queue model.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130535397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Least Significant Bit Steganographic Method Using Hough Transform Technique 一种基于霍夫变换的最小有效位隐写方法
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2023.030203
D. Nashat, Loay Mamdouh
{"title":"A Least Significant Bit Steganographic Method Using Hough Transform Technique","authors":"D. Nashat, Loay Mamdouh","doi":"10.33969/j-nana.2023.030203","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030203","url":null,"abstract":"Steganography is a data-hiding scientific branch that aims to hide secret data in an image, video, or audio. Image steganography methods try to embed a large amount of data into images with high imperceptibility. However, increasing the number of embedded data in the image decreases its quality. Therefore, in this paper, a new method based on Least Significant Bit (LSB) using Hough Transform is proposed to improve the stego image quality with increasing the amount of embedded data. The LSB is the common embedding steganography method due to its simplicity of implementation and low complexity. The proposed method inverts the LSBs of image pixels to enhance the quality of stego image. First, improved edge detection filter is used to detect edges areas. Then, we invert LSBs for the pixel in edge area pixels. Finally, the LSBs smooth area pixels of the cover image are inverted. The performance of the presented method is evaluated for the stego image quality and the amount of embedded data. The results show that the new method has better performance in comparison with the current methods in terms of Peak Signal-to-Noise Ratio (PSNR) and capacity.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Distributed Denial of Service Flooding Attack Using Odds Ratio 基于比值比的分布式拒绝服务洪水攻击检测
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010204
D. Nashat, Fatma A. Hussain, Xiaohong Jiang
{"title":"Detection of Distributed Denial of Service Flooding Attack Using Odds Ratio","authors":"D. Nashat, Fatma A. Hussain, Xiaohong Jiang","doi":"10.33969/j-nana.2021.010204","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010204","url":null,"abstract":"Computer networks are vulnerable to many types of attacks while the Distributed Denial of Service attack (DDoS) serves as one of the top concerns for security professionals. The DDoS flooding attack denies the services by consuming the server resources to prevent the legitimate users from using their desired services. The hardness of detecting this attack lies in sending a stream of packets to the server with spoofed IP addresses, so that the internet routing infrastructure cannot distinguish the spoofed packets. Based on the odds ratio (OR) statistical measurement, in this work we propose a new detection method for the DDoS flooding attacks. By exploring the odds ratio to determine the risk factor of any incoming traffic to the server, the legitimate and attack traffic packets can be easily differentiated. Experimental results demonstrate the efficiency of the presented detection method in terms of its detection probability and detection time.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130953759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ReSQ: Reinforcement Learning-Based Queue Allocation in Software-Defined Queuing Framework 软件定义队列框架中基于强化学习的队列分配
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020402
Ilora Maity, T. Taleb
{"title":"ReSQ: Reinforcement Learning-Based Queue Allocation in Software-Defined Queuing Framework","authors":"Ilora Maity, T. Taleb","doi":"10.33969/j-nana.2022.020402","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020402","url":null,"abstract":"With the evolution of 5G networks, the demand for Ultra-Reliable Low Latency Communications (URLLC) services is increasing. Software-Defined Networking (SDN) offers flexible network management to prioritize URLLC services coexisting with best-effort traffic. Utilizing the network programmability feature of SDN, Software-Defined Queueing (SDQ) framework selects the optimal output port queue on forwarding devices and routing path for incoming traffic flows to provide deterministic Quality of Service (QoS) support required for URLLC traffic. However, in the existing SDQ framework, the selections of optimal queue and path are done manually by observing the traffic type of each incoming flow, the available bandwidth of each potential routing path, and the status of output port queues of each forwarding device on each potential routing path. The static allocations of path and queue for each flow are inefficient to provide a deterministic QoS guarantee for a high volume of incoming traffic which is typical in 5G networks. The limited buffer availability on the forwarding devices is another constraint regarding optimal queue allocation that ensures an end-to-end (E2E) delay guarantee. To address these challenges, in this paper, we extend the SDQ framework by automating queue management with a reinforcement learning (RL)-based approach. The proposed queue management approach considers diverse QoS demands as well as a limited buffer on the forwarding devices and performs prioritized queue allocation. Our approach also includes a hash-based flow grouping to handle a high volume of traffic having diverse latency demands and a path selection mechanism based on available bandwidth and hop count. The simulation result shows that the proposed scheme ReSQ reduces the QoS violation ratio by 10.45% as compared to the baseline scheme that selects queues randomly.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信