IET NetworksPub Date : 2024-06-06DOI: 10.1049/ntw2.12127
Kuan-Chu Lu, I. Liu, Zong‐Chao Liu, Jung-Shian Li
{"title":"Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system","authors":"Kuan-Chu Lu, I. Liu, Zong‐Chao Liu, Jung-Shian Li","doi":"10.1049/ntw2.12127","DOIUrl":"https://doi.org/10.1049/ntw2.12127","url":null,"abstract":"Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency, and improved reliability, they are vulnerable to cyberattacks, with consequences ranging from the inconvenience and minor disruption to severe physical damage and even loss of life. The authors evaluate the security of the Dam system in the form of Common Criteria, develop safety goals to improve this safety, and focus on threats and risks to the dam SCADA system. Finally proposes an anomaly‐based machine‐learning framework for detecting malicious network attacks in the SCADA system of a dam. Three unsupervised classification algorithms are considered: hierarchical clustering, local outlier factor, and isolation forest. It is shown that the hierarchical clustering algorithm achieves the highest precision and F‐score of the three algorithms. Overall, the results confirm the effectiveness of anomaly‐based detection algorithms in enhancing the robustness of SCADA systems toward malicious attacks. At the same time, it complies with the security objectives of Common Criteria, achieving the safety and protection of the dam.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-05-21DOI: 10.1049/ntw2.12126
N. Alsalmi, K. Navaie, H. Rahmani
{"title":"Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach","authors":"N. Alsalmi, K. Navaie, H. Rahmani","doi":"10.1049/ntw2.12126","DOIUrl":"https://doi.org/10.1049/ntw2.12126","url":null,"abstract":"The efficient development of Mobile Wireless Sensor Networks (MWSNs) relies heavily on optimizing two key parameters: Throughput and Energy Consumption. The proposed work investigates network connectivity issues with MWSN and proposes two routing algorithms, namely Self‐Organising Maps based‐Optimised Link State Routing (SOM‐OLSR) and Deep Reinforcement Learning based‐Optimised Link State Routing (DRL‐OLSR) for MWSNs. The primary objective of the proposed algorithms is to achieve energy‐efficient routing while maximizing throughput. The proposed algorithms are evaluated through simulations by considering various performance metrics, including connection probability (CP), end‐to‐end delay, overhead, network throughput, and energy consumption. The simulation analysis is discussed under three scenarios. The first scenario undertakes ‘no optimisation’, the second considers SOM‐OLSR, and the third undertakes DRL‐OLSR. A comparison between DRL‐OLSR and SOM‐OLSR reveals that the former surpasses the latter in terms of low latency and prolonged network lifetime. Specifically, DRL‐OLSR demonstrates a 47% increase in throughput, a 67% reduction in energy consumption, and a CP three times higher than SOM‐OLSR. Furthermore, when contrasted with the ‘no optimisation’ scenario, DRL‐OLSR achieves a remarkable 69.7% higher throughput and nearly 89% lower energy consumption. These findings highlight the effectiveness of the DRL‐OLSR approach in wireless sensor networks.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141118592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-04-07DOI: 10.1049/ntw2.12125
Umar Aliyu, Haifa Takruri, Martin Hope, A. Gidado, Hamid Abubakar Adamu
{"title":"Disaster scenario optimised link state routing protocol and message prioritisation","authors":"Umar Aliyu, Haifa Takruri, Martin Hope, A. Gidado, Hamid Abubakar Adamu","doi":"10.1049/ntw2.12125","DOIUrl":"https://doi.org/10.1049/ntw2.12125","url":null,"abstract":"Natural and artificial (human‐made) disasters have been steadily increasing all over the world, signifying the importance of providing reliable and energy friendly communication network to survivors in the aftermath of a disaster. On the other hand, low‐battery devices running optimised link state routing (OLSR) protocol often experience quick power failure which restricts their ability to communicate for a necessary period during rescue operations. To extend the lifespans and prioritise message delivery on low‐battery devices, the authors examine disaster scenario optimised link state routing (DS‐OLSR) protocol ALERT message and propose an innovative solution to prioritise messages based on the device battery energy level, leading to more energy conservation, packet delivery as well as better emotional state of survivors. An ALERT message is a novel message type added to mobile ad‐hoc network's (MANET) popular OLSR protocol for energy efficiency. The proposed DS‐OLSR Protocol and Message Prioritisation (DS‐OLSRMP) as an extension of DS‐OLSR modifies the multipoint relay mechanism and uses a prioritisation technique which classify nodes into four priority groups: Critical, High, Medium, and Low priorities. These priority groups help in prioritising both message delivery and message status notifications for devices with low battery energy. The DS‐OLSRMP was implemented in a Network Simulator, version 3.29 and compared with DS‐OLSR, OLSRv1 and OLSRv2. The simulation results show that DS‐OLSRMP performs better than DS‐OLSR, OLSRv1 and OLSRv2 in terms of energy conservation and packets delivery in the simulation of both sparse and dense network scenarios.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140733221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-04-02DOI: 10.1049/ntw2.12123
Wenbo Wang, Peng Yi, Huikai Xu
{"title":"A PU-learning based approach for cross-site scripting attacking reality detection","authors":"Wenbo Wang, Peng Yi, Huikai Xu","doi":"10.1049/ntw2.12123","DOIUrl":"10.1049/ntw2.12123","url":null,"abstract":"<p>Cross-site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with the attacking reality. The authors collect responses from a web server and train a bagging-based PU learning model to determine whether the XSS vulnerability is truly triggered. To validate the authors’ proposed framework, experiments are performed on 5 popular web applications with 11 specified CVE recorded vulnerabilities and 32 vulnerable inputs. Results show that the authors’ approach outperforms existing research studies, effectively identifies the attacking reality from attacking attempts, and meanwhile reduces the number of worthless security alarms.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12123","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140754465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-03-12DOI: 10.1049/ntw2.12121
Deva Priya Isravel, Salaja Silas, Jaspher Kathrine, Elijah Blessing Rajsingh, Andrew J
{"title":"Enhanced multivariate singular spectrum analysis-based network traffic forecasting for real time industrial IoT applications","authors":"Deva Priya Isravel, Salaja Silas, Jaspher Kathrine, Elijah Blessing Rajsingh, Andrew J","doi":"10.1049/ntw2.12121","DOIUrl":"10.1049/ntw2.12121","url":null,"abstract":"<p>Industrial IoT (IIoT) applications are widely used in multiple use cases to automate the industrial environment. Industry 4.0 presents challenges in numerous areas, including heterogeneous data, efficient data sensing and collection, real-time data processing, and higher request arrival rates, due to the massive amount of industrial data. Building a time-sensitive network that supports the voluminous and dynamic IoT traffic from heterogeneous applications is complex. Therefore, the authors provide insights into the challenges of industrial networks and propose a strategy for enhanced traffic management. An efficient multivariate forecasting model that adapts the Multivariate Singular Spectrum Analysis is employed for an SDN-based IIoT network. The proposed method considers multiple traffic flow parameters, such as packet sent and received, flow bytes sent and received, source rate, round trip time, jitter, packet arrival rate and flow duration to predict future flows. The experimental results show that the proposed method can effectively predict by contemplating every possible variation in the observed samples and predict average load, delay, inter-packet arrival rate and source sending rate with improved accuracy. The forecast results shows reduced error estimation when compared with existing methods with Mean Absolute Percentage Error of 1.64%, Mean Squared Error of 11.99, Root Mean Squared Error of 3.46 and Mean Absolute Error of 2.63.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12121","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140249853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-03-08DOI: 10.1049/ntw2.12120
Asad Ali Malik, Muhammad Ali Jamshed, Ali Nauman, Adeel Iqbal, Atif Shakeel, Riaz Hussain
{"title":"Performance evaluation of handover triggering condition estimation using mobility models in heterogeneous mobile networks","authors":"Asad Ali Malik, Muhammad Ali Jamshed, Ali Nauman, Adeel Iqbal, Atif Shakeel, Riaz Hussain","doi":"10.1049/ntw2.12120","DOIUrl":"https://doi.org/10.1049/ntw2.12120","url":null,"abstract":"<p>Heterogeneous networks (HetNets) refer to the communication network, consisting of different types of nodes connected through communication networks deploying diverse radio access technologies like LTE, Wi-Fi, Zigbee, and Z-wave, and using different communication protocols and operating frequencies. Vertical handover, is the process of switching a mobile device from one network type to another, such as from a cellular network to a Wi-Fi network, and is critical for ensuring a seamless user experience and optimal network performance, within the handover process handover triggering estimation is one of the crucial step affecting the overall performance. A mathematical analysis is presented for the handover triggering estimation. The performance evaluation shows significant improvement in the probability of successful handover using the proposed handover triggering condition based on speed, distance, and different mobility models. The handover triggering condition is optimised based on the speed of the mobile node, handover completion time, and the coverage range of the current and the target networks of the HetNet node, with due consideration of the mobility model.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12120","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-02-29DOI: 10.1049/ntw2.12119
Haesik Kim
{"title":"Sub‐optimal Internet of Thing devices deployment using branch and bound method","authors":"Haesik Kim","doi":"10.1049/ntw2.12119","DOIUrl":"https://doi.org/10.1049/ntw2.12119","url":null,"abstract":"The Internet of Thing (IoT) network deployments are widely investigated in 4G and 5G systems and will still be key technical systems to drive massive connectivity of 6G systems. In 6G, IoT systems will operate with 6G new technologies such as Integrated Sensing and Communications. The IoT systems of 6G will be a platform to collect information in real world and create new use cases and business models. As the IoT devices and cellular networks are getting smarter, the IoT ecosystem allows us to bridge between human life and digital life and accelerate the transition towards a hyper‐connected world. Optimal and scalable IoT network design has been investigated in many research groups but key challenges in this topic still remain. An IoT devices deployment problem is investigated to minimise the transmission and computation cost among network nodes. The IoT devices deployment problem is formulated as Mixed‐Integer Nonlinear Programming problem. After relaxing the constraints and transforming the problem to a mixed integer linear programming (MILP) problem, the authors propose a new branch and bound (BB) method with a machine learning function and solve the MILP problem as a sub‐optimal solution. In the numerical analysis, the authors evaluate both conventional BB method and the proposed BB method with weighting factors and compare the objective function values, the number of explored nodes, and computational time. The performances of the proposed BB method are significantly improved under the given simulation configuration. The author finds the optimal mapping of IoT devices to fusion nodes.","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140408512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-02-28DOI: 10.1049/ntw2.12118
Michael Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Rabie
{"title":"Guest Editorial: Special issue on network/traffic optimisation towards 6G network","authors":"Michael Logothetis, João Paulo Barraca, Shigeo Shioda, Khaled Rabie","doi":"10.1049/ntw2.12118","DOIUrl":"https://doi.org/10.1049/ntw2.12118","url":null,"abstract":"<p>An even faster and more heterogeneous communication infrastructure is planned for the 6G network, based on 5G in a way that leads us to much more deeply connected, programmable, intelligent, and sensing devices, with excellent network performance and coverage, and new dimensions of functionality. Therefore, 6G brings even greater challenges to network/traffic engineering and optimisation.</p><p>This virtual collection on Network/Traffic Optimisation towards 6G Network brings together the best six research papers submitted from academia, and reflects some of the latest and original achievements, concentrating on the performance of a mobile hotspot in vehicular communication, on the mobility modelling and ad hoc routing in Flying Ad-hoc NETworks (FANETs), on the performance of a joint antenna and relay selection Multiple-Input Multiple-Output (MIMO) system for cooperative Non-Orthogonal Multiple Access (NOMA) networks, on optimal resource optimisation based on multi-layer monitoring and Machine Learning (ML), on Voice over Wi-Fi Security Threats—Address Resolution Protocol (ARP) attacks and countermeasures—and on the management of 5G and Beyond networks through cloud-native deployments and end-to-end monitoring.</p><p>Although the rapid and substantial changes in networking technologies towards the 6G Network over the recent years could readily justify this virtual issue, our real motivation was the 13th event of the International Symposium of Communications Systems, Networks and Digital Signal Processing, held in Porto, Portugal (20–22 July 2022), and the IET's open call.</p><p>We begin with the first paper where Marinos Vlasakis et al theoretically analyse the performance of a mobile hotspot with limited bandwidth capacity and a Connection Admission Control functionality which provides Quality of Service (QoS) support for handover voice calls by serving them in priority over new voice calls. An interesting application example of vehicular communication is presented by considering a vehicle (say a bus), which alternates between stop and moving phases. In the stop phase, the vehicle can service both new and handover calls, while in the moving phase, only new calls (originating from the vehicle) are supported. Obviously, when passengers enter the vehicle while talking on their mobile phone, a handover should occur, that is, the Access Point must support handover connections in priority over new call connections. To this end, the capacity of the mobile hotspot is probabilistically reserved during the stop phase to benefit handover calls. In this case, new calls are accepted with a probability. This is called probabilistic bandwidth reservation policy. The system is modelled based on three-dimensional Markov chains. Moreover, the traffic is assumed quasi-random (originating from a finite traffic source population). This consideration is the first for loss/queueing models applied in a mobile hotspot and is proven to be very essential.</p><p>In the s","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12118","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140104346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating delay of the media access control protocols for IoT-RoF using quantum entanglement","authors":"Shakir Salman Ahmad, Hamed Al-Raweshidy, Rajagopal Nilavalan","doi":"10.1049/ntw2.12117","DOIUrl":"10.1049/ntw2.12117","url":null,"abstract":"<p>One of the significant challenges of the Radio over fibre (RoF) Medium Access Control (MAC) protocol is the propagation delay. This delay can lead to serious issues, such as higher propagation delay resulting in collisions and unnecessary retransmissions. Quantum entanglement is an excellent candidate to overcome the propagation delay of the RoF MAC protocol. A new quantum MAC protocol is proposed, named the Quantum Entanglement-based MAC protocol (QE-MAC), in which Quantum Teleportation is utilised to address the propagation delay. Four entanglement states are employed to represent the control packets of the classical MAC protocol, and data is transmitted over the classical channel. Instead of using control packets such as acknowledgement, request to send, and Clear to send, state transitions are employed. This approach avoids the delay and collision issues associated with control packets, resulting in a significant improvement in network performance. The delay, duty cycle (DC), and power consumption of the proposed QE-MAC protocol are formulated and derived. The protocol is evaluated in terms of delay, DC, and power consumption, demonstrating superior performance compared to the classical RoF MAC protocol. In comparison to published works, our proposed approach has successfully reduced both delay and power consumption by 35%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140433534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-02-20DOI: 10.1049/ntw2.12116
Hatem Fetoh, Khaled M. Amin, Ahmed M. Hamad
{"title":"Packets distribution over asymmetric paths using concurrent multipath transfer","authors":"Hatem Fetoh, Khaled M. Amin, Ahmed M. Hamad","doi":"10.1049/ntw2.12116","DOIUrl":"10.1049/ntw2.12116","url":null,"abstract":"<p>Concurrent multipath transfer (CMT) is a transport layer protocol used for transferring data over multiple paths concurrently. In the case of asymmetric paths, the dissimilarity of delay, bandwidth, and loss rate among paths leads to challenges such as out-of-order packets, receiver buffer blocking, and throughput reduction. A framework that uses the end-to-end delay of paths to distribute the packets over asymmetric paths in ordering policy is proposed. The proposed framework detects network congestion in the assigned path and reduces the congestion window. Furthermore, the proposed framework predicts receiver buffer blocking and deactivates the highest delay path that causes this problem. The simulation results show that the proposed framework achieves highest throughput, lower entropy and lower average application end-to-end delay than the previous algorithms.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140447606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}