IET Networks最新文献

筛选
英文 中文
Joint Weighted Dynamic Resources Optimisation in Green Open Radio Access Network 绿色开放无线接入网络联合加权动态资源优化
IF 1.3
IET Networks Pub Date : 2025-04-29 DOI: 10.1049/ntw2.70004
Raad S. Alhumaima, M. S. Al-Abadi, Basit N. Khalaf, Riyadh Khlf Ahmed
{"title":"Joint Weighted Dynamic Resources Optimisation in Green Open Radio Access Network","authors":"Raad S. Alhumaima,&nbsp;M. S. Al-Abadi,&nbsp;Basit N. Khalaf,&nbsp;Riyadh Khlf Ahmed","doi":"10.1049/ntw2.70004","DOIUrl":"https://doi.org/10.1049/ntw2.70004","url":null,"abstract":"<p>The rapid growth of interconnected devices and data traffic necessitates robust mobile networks, especially in rural areas with unreliable grid power. This paper introduces an optimisation framework for the off-grid green open radio access network architecture utilising renewable energy to meet this demand. The framework aims to optimise power and bandwidth allocation, ensuring high data rates and reliability from sustainable sources. In addition, the CO<sub>2</sub> emission factor and the quality of service are also optimised in which several assumptions and network metrics have been incorporated such as power consumption (PC), load demand, number of virtual machines (VMs) and maintenance cost. The problem is formulated as the weighted nonlinear problem. First, the model has been formulated using simplified data rate assumption and has been solved mathematically using Lagrange multipliers. Subsequently, the mathematical problem has been solved using the gradient descent numerical solution and then compared with sequential quadratic programming (SQP) and interior point algorithms. The second assumption is formulated as the data rate considering the noise and interference factors; the comparative analysis of SQP, active set and interior point algorithms has been presented. The third case assumed the dynamic behaviour of the network of users and VMs, where the problem is also solved mathematically and numerically. Empirical evidence from rural deployments confirms the enhancement of mobile coverage and service provision through the integration of solar and wind-powered base stations.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143889046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green IoT: Energy Efficiency, Renewable Integration, and Security Implications 绿色物联网:能源效率、可再生能源整合和安全影响
IF 1.3
IET Networks Pub Date : 2025-04-08 DOI: 10.1049/ntw2.70003
Mohammed Qasim Alazzawi, Juan-Carlos Sánchez-Aarnoutse, Alejandro Santos Martínez-Sala, Maria-Dolores Cano
{"title":"Green IoT: Energy Efficiency, Renewable Integration, and Security Implications","authors":"Mohammed Qasim Alazzawi,&nbsp;Juan-Carlos Sánchez-Aarnoutse,&nbsp;Alejandro Santos Martínez-Sala,&nbsp;Maria-Dolores Cano","doi":"10.1049/ntw2.70003","DOIUrl":"https://doi.org/10.1049/ntw2.70003","url":null,"abstract":"<p>The increasing proliferation of Internet of Things (IoT) networks has resulted in rising energy demands, making energy management a crucial challenge for sustainable development. This paper presents a comprehensive survey of energy management strategies in IoT, focusing on energy harvesting and energy-saving techniques aimed at reducing energy consumption and extending the lifespan of IoT networks. In particular, the authors explore the integration of renewable energy sources, such as solar, thermal, and mechanical energy, to reduce the carbon footprint and improve the efficiency of IoT devices. Additionally, the survey highlights the security vulnerabilities that arise from energy management practices and proposes mitigation strategies to ensure secure and sustainable IoT ecosystems. The findings emphasise the importance of optimising both energy efficiency and security in future IoT deployments.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143801392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A predictive energy-efficient adaptive routing methodology for Mobile Ad hoc Networks 移动自组织网络的预测节能自适应路由方法
IF 1.3
IET Networks Pub Date : 2025-03-19 DOI: 10.1049/ntw2.70001
Neelam Malyadri, Ramakrishna M, Rajesh Nandalike, Pundalik Chavan, Supreeth S, Dayananda P, Rohith S
{"title":"A predictive energy-efficient adaptive routing methodology for Mobile Ad hoc Networks","authors":"Neelam Malyadri,&nbsp;Ramakrishna M,&nbsp;Rajesh Nandalike,&nbsp;Pundalik Chavan,&nbsp;Supreeth S,&nbsp;Dayananda P,&nbsp;Rohith S","doi":"10.1049/ntw2.70001","DOIUrl":"https://doi.org/10.1049/ntw2.70001","url":null,"abstract":"<p>A Mobile Ad hoc Network (MANET) is a self-configuring, infrastructure-less network of mobile devices connected wirelessly. In this paper, a novel approach, the Predictive Energy-efficient Adaptive Routing Technique (PEAR) approaches to the infrastructure-less network of mobile devices, addressing the intrinsic challenges of MANETs. PEAR is a network management system that uses real-time predictive analytics to forecast and adapt to topological changes due to node mobility, ensuring robust and proactive route management. It incorporates energy-aware routing decisions, conserving battery life and extending operational longevity, and uses a multi-factor routing algorithm. PEAR ensures loop-free routing to minimize latency and maintain scalability, making it adept at handling the growing complexity of MANET applications. PEAR outperformed Mobile Ad hoc On-demand Routing, showing throughput improvements of 2.5% at 5 m/s and 3.125% at 30 m/s, routing overhead reductions of 66.67% at 5 m/s and 50% at 30 m/s, energy consumption decreases by 66.67% at 5 m/s and 55.56% at 30 m/s, and a significant reduction in average delay by 66.67% at 5 m/s and 55.56% at 30 m/s, proving its superior efficiency and reliability in mobile networks.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143689170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-5G and B5G/6G resource allocation and network slicing orchestration using learning algorithms 使用学习算法的IoT-5G和B5G/6G资源分配和网络切片编排
IF 1.3
IET Networks Pub Date : 2025-02-25 DOI: 10.1049/ntw2.70002
Ado Adamou Abba Ari, Faustin Samafou, Arouna Ndam Njoya, Assidé Christian Djedouboum, Moussa Aboubakar, Alidou Mohamadou
{"title":"IoT-5G and B5G/6G resource allocation and network slicing orchestration using learning algorithms","authors":"Ado Adamou Abba Ari,&nbsp;Faustin Samafou,&nbsp;Arouna Ndam Njoya,&nbsp;Assidé Christian Djedouboum,&nbsp;Moussa Aboubakar,&nbsp;Alidou Mohamadou","doi":"10.1049/ntw2.70002","DOIUrl":"https://doi.org/10.1049/ntw2.70002","url":null,"abstract":"<p>The advent of 5G networks has precipitated an unparalleled surge in demand for mobile communication services, propelled by the advent of sophisticated wireless technologies. An increasing number of countries are moving from fourth generation (4G) to fifth generation (5G) networks, creating a new expectation for services that are dynamic, transparent, and differentiated. It is anticipated that these services will be adapted to a multitude of use cases and will become a standard practice. The diversity of these use cases and the increasingly complex network infrastructures present significant challenges, particularly in the management of resources and the orchestration of services. Network Slicing is emerging as a promising approach to address these challenges, as it facilitates efficient Resource Allocation (RA) and supports self-service capabilities. However, effective network segmentation implementation requires the development of robust algorithms to guarantee optimal RA. In this regard, artificial intelligence and machine learning (ML) have demonstrated their utility in the analysis of large datasets and the facilitation of intelligent decision-making processes. However, certain ML methodologies are limited in their ability to adapt to the evolving environments characteristic of 5G networks and beyond (B5G/6G). This paper examines the specific challenges associated with the evolution of 5G and B5G/6G networks, with a particular focus on ML solutions for RA and dynamic network slicing orchestration requirements. Moreover, the article presents potential avenues for further research in this domain with the objective of enhancing the efficiency of next-generation mobile networks through the adoption of innovative technological solutions.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A methodology for estimating radiofrequency signal attenuation from rainfall and atmospheric gases in 5G-and-beyond networks 一种估算5g及以上网络中降雨和大气气体射频信号衰减的方法
IF 1.3
IET Networks Pub Date : 2025-02-16 DOI: 10.1049/ntw2.70000
Andreza P. Batista, Muhammad S. Ayub, Pablo Adasme, Dante C. Begazo, Muhammad R. Shad, Muhammad Saadi, Renata L. Rosa, Demóstenes Z. Rodríguez
{"title":"A methodology for estimating radiofrequency signal attenuation from rainfall and atmospheric gases in 5G-and-beyond networks","authors":"Andreza P. Batista,&nbsp;Muhammad S. Ayub,&nbsp;Pablo Adasme,&nbsp;Dante C. Begazo,&nbsp;Muhammad R. Shad,&nbsp;Muhammad Saadi,&nbsp;Renata L. Rosa,&nbsp;Demóstenes Z. Rodríguez","doi":"10.1049/ntw2.70000","DOIUrl":"https://doi.org/10.1049/ntw2.70000","url":null,"abstract":"<p>Industrial applications demand ultra-reliable and low latency communications, especially in Industrial Internet of Things (IIoT) environments. To meet these expectations, telecommunication network technologies have evolved, culminating in the deployment of fifth-generation (5G) networks by telecom operators worldwide. However, 5G and beyond networks, operating in millimetre-wave frequency bands, can suffer signal degradation caused by atmospheric phenomena, such as rainfall and atmospheric gases. This article presents a significant contribution to scientific research by proposing a methodology that leverages ITU-R recommendations (P.530, P.837, P.838, P.618-13, P.839-4, P.1511-2) for rain-induced attenuation and incorporates local meteorological data using the Gumbel Distribution. Also, the methodology considers ITU-R Recommendations (P.676, P.836, P.835) for atmospheric gas-induced attenuation. A comprehensive flowchart demonstrates the practical application of these recommendations, enabling accurate assessment of signal attenuation for various cities around the world with distinct geographical coordinates. The dataset is obtained from local Meteorological Stations or using digital maps from ITU recommendations. The results obtained with the approximate values of precipitation rates using the proposed method were compared with values from the ITU's study group and verified the effectiveness of the proposed approach, with relative errors not exceeding 1.07%. These analyses indicated the potential impact of atmospheric conditions on 5G network performance, offering valuable insights for optimising network design and improving communication reliability that is relevant to IIoT applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.70000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143423732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved affinity propagation method for maximising system sum rate and minimising interference for 3D multi-UAV placement in disaster area 一种用于灾区三维多无人机部署的系统和速率最大化和干扰最小化的改进亲和传播方法
IF 1.3
IET Networks Pub Date : 2025-01-24 DOI: 10.1049/ntw2.12143
Nooshin Boroumand Jazi, Farhad Faghani, Mahmoud Daneshvar Farzanegan
{"title":"An improved affinity propagation method for maximising system sum rate and minimising interference for 3D multi-UAV placement in disaster area","authors":"Nooshin Boroumand Jazi,&nbsp;Farhad Faghani,&nbsp;Mahmoud Daneshvar Farzanegan","doi":"10.1049/ntw2.12143","DOIUrl":"https://doi.org/10.1049/ntw2.12143","url":null,"abstract":"<p>In emergencies where several ground base stations (GBS) are no longer available, mobile base stations based on unmanned aerial vehicles (UAVs) can efficiently resolve coverage issues in remote areas due to their cost-effectiveness and versatility. Natural disasters, such as a deluge, cause damage to the terrestrial wireless infrastructure. The main challenge in these systems is to determine the optimal 3D placement of UAVs to meet the dynamic demand of users and minimise interference. Various mathematical frameworks and efficient algorithms are suggested for designing, optimising, and deploying UAV-based communication systems. This paper investigates the challenges of 3D UAV placement through machine learning (ML) and enhanced affinity propagation (EAP). Lastly, the simulation results indicate that the proposed approach improves the system sum rate, interference, and coverage performance compared to DBSCAN, k-means, and k-means++ methods. Therefore, this paper identifies UAVs' most effective 3D placement, including minimising the number of UAVs, maximising the number of covered users, and maximising the system sum rate for an arbitrary distribution of users in the disaster area. Additionally, this paper addresses the issue of interference minimisation.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12143","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority-based resource optimisation and user association in integrated networks 综合网络中基于优先级的资源优化与用户关联
IF 1.3
IET Networks Pub Date : 2025-01-24 DOI: 10.1049/ntw2.12140
Sana Sharif, Shahid Manzoor, Waleed Ejaz
{"title":"Priority-based resource optimisation and user association in integrated networks","authors":"Sana Sharif,&nbsp;Shahid Manzoor,&nbsp;Waleed Ejaz","doi":"10.1049/ntw2.12140","DOIUrl":"https://doi.org/10.1049/ntw2.12140","url":null,"abstract":"<p>The future sixth-generation (6G) networks are envisioned to integrate satellites, aerial, ground, and sea networks to provide seamless connectivity. However, some challenges are associated with integrated networks, including optimal resource utilisation, energy efficiency, delay, higher data rates, heterogeneity, and on-demand connectivity. This paper focuses on optimising energy efficiency, resource utilisation, and task priority-based user association. To achieve this, a mathematical framework is formulated to maximise energy efficiency, resource utilisation, and user connectivity in integrated networks while satisfying constraints related to transmit power, data rate, and computation resources. The formulated problem is a binary linear programming problem, as the decision variable is binary and the constraints are linear. The authors solve this optimisation problem using three methods: the branch and bound algorithm (BBA), the interior point method (IPM), and the barrier simplex algorithm (BSA). The authors use the results obtained from BBA as a benchmark to evaluate the performance of IPM and BSA. Simulation results show that the performance of IPM and BSA is comparable to the BBA but with lower complexity.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relay-assisted D2D communication over novel multicluster two-wave and multi-cluster fluctuating two-ray channels 基于新型多簇双波和多簇波动双射线信道的中继辅助D2D通信
IF 1.3
IET Networks Pub Date : 2024-12-17 DOI: 10.1049/ntw2.12142
Haider Mehdi, Zakir Hussain, Muhammad Junaid Rabbani, Syed Muhammad Atif Saleem, Syed Areeb Ahmed
{"title":"Relay-assisted D2D communication over novel multicluster two-wave and multi-cluster fluctuating two-ray channels","authors":"Haider Mehdi,&nbsp;Zakir Hussain,&nbsp;Muhammad Junaid Rabbani,&nbsp;Syed Muhammad Atif Saleem,&nbsp;Syed Areeb Ahmed","doi":"10.1049/ntw2.12142","DOIUrl":"https://doi.org/10.1049/ntw2.12142","url":null,"abstract":"<p>A decode and forward relay assisted device-to-device (D2D) communications over a novel multicluster two-wave (MTW) fading is analysed with Terahertz (THz) channel conditions. Co-channel interference (CCI) over a recently proposed multi-cluster fluctuating two-ray (MFTR) fading is also present at relay and receiver. Maximal ratio combining (MRC) and power harvesting based on power splitting are present at relay and receiver. A characteristic function based approach is used here to derive success probability, outage probability and capacity with outage expressions. The expressions depend on THz channel parameters, distances between various nodes in D2D system, power harvesting parameter and fading channel conditions. The system is numerically analysed under various D2D network conditions.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12142","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel strategy for optimal data replication in peer-to-peer networks based on a multi-objective optimisation – NSGA-II algorithm 基于多目标优化NSGA-II算法的点对点网络最优数据复制新策略
IF 1.3
IET Networks Pub Date : 2024-12-12 DOI: 10.1049/ntw2.12141
Abouzar Samimi, Maryam Goudarzi
{"title":"A novel strategy for optimal data replication in peer-to-peer networks based on a multi-objective optimisation – NSGA-II algorithm","authors":"Abouzar Samimi,&nbsp;Maryam Goudarzi","doi":"10.1049/ntw2.12141","DOIUrl":"https://doi.org/10.1049/ntw2.12141","url":null,"abstract":"<p>A peer-to-peer (P2P) network is defined as a distributed network in which nodes with similar characteristics exchange data with others. Efficient data sharing in P2P systems is essentially faced with challenges due to uncertainties of erratic node failures and unreliable network connectivity. Data replication on multiple nodes can improve availability and alleviate latency. However, the number of created replicas and the corresponding location of these replicas need to be determined optimally. In this paper, a novel framework for data replication is proposed in P2P networks, in which optimal allocations are achieved based on the two objectives including the minimisation of delay and maximisation of hit rate of queries. The proposed model finds allocations that specify the number and location of each replica of existing files in the network based on two considered objectives. A multi-objective technique based on the Non-Dominated Sorting Genetic Algorithm II (NSGA-II) algorithm is utilised to solve the proposed model and to extract non-dominated Pareto-optimal solutions of the allocations. Finally, one of the allocations of the obtained Pareto optimal set is applied to the network and the delay and hit rate of queries pertaining to this situation is compared with two models: i) initial model of the network, that is, the state where there is no replica of the files except the original version of the file, and ii) the random replication model to verify the efficiency of the presented method. All simulations in this paper have been done using C++ programming language.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variance-driven security optimisation in industrial IoT sensors 方差驱动的工业物联网传感器安全优化
IF 1.3
IET Networks Pub Date : 2024-11-16 DOI: 10.1049/ntw2.12139
Hardik Gupta, Sunil K. Singh, Sudhakar Kumar, Karan Sharma, Hardeep Saini, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
{"title":"Variance-driven security optimisation in industrial IoT sensors","authors":"Hardik Gupta,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Karan Sharma,&nbsp;Hardeep Saini,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/ntw2.12139","DOIUrl":"https://doi.org/10.1049/ntw2.12139","url":null,"abstract":"<p>The Industrial Internet of Things (IIoT) has transformed industrial operations with real-time monitoring and control, enhancing efficiency and productivity. However, this connectivity brings significant security challenges. This study addresses these challenges by identifying abnormal sensor data patterns using machine learning-based anomaly detection models. The proposed framework employs advanced algorithms to strengthen industrial defences against cyber threats and disruptions. Focusing on temperature anomalies, a critical yet often overlooked aspect of industrial security, this research fills a gap in the literature by evaluating machine learning models for this purpose. A novel variance-based model for temperature anomaly detection is introduced, demonstrating high efficacy with accuracy scores of 0.92 and 0.82 on the NAB and AnoML-IOT datasets, respectively. Additionally, the model achieved F1 scores of 0.96 and 0.89 on these datasets, underscoring its effectiveness in enhancing IIoT security and optimising cybersecurity for industrial processes. This research not only identifies security vulnerabilities but also presents concrete solutions to improve the security posture of IIoT systems.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信