IET NetworksPub Date : 2024-10-17DOI: 10.1049/ntw2.12136
Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel
{"title":"Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method","authors":"Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel","doi":"10.1049/ntw2.12136","DOIUrl":"https://doi.org/10.1049/ntw2.12136","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>In a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the dissemination of different types of messages, such as those for emergencies or traffic updates. However, previous research has not sufficiently addressed the challenges of energy efficiency, security, and reliability in VANET routing. This work aims to fill that gap by analysing the performance of three major VANET routing protocols—ad hoc on-demand distance vector (AODV), Optimised Link State Routing (OLSR), and Destination Sequenced Distance Vector—integrated with elliptic curve integrated encryption. The goal is to determine the most suitable routing protocol based on these key parameters. The study involves two key processes: registration and authentication, and the analysis of ECIE-enhanced routing protocols (ECIE-AODV, ECIE-OLSR, and ECIE-DSDV). These protocols were simulated using OMNET++ and SUMO tools, and the results were evaluated based on metrics such as throughput, packet delivery ratio, end-to-end delay (e2e), jitter, and routing overhead.</p>\u0000 </section>\u0000 </div>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"377-394"},"PeriodicalIF":1.3,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-10-08DOI: 10.1049/ntw2.12134
Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, Balasubramaniyan Chandrasekaran
{"title":"An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks","authors":"Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, Balasubramaniyan Chandrasekaran","doi":"10.1049/ntw2.12134","DOIUrl":"https://doi.org/10.1049/ntw2.12134","url":null,"abstract":"<p>The authors introduce an unsupervised Intrusion Detection System designed to detect zero-day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training on attack information. Zero-day attacks exploit previously unknown vulnerabilities, making them hard to detect with traditional deep learning and machine learning systems that require pre-labelled data. Labelling data is also a time-consuming task for security experts. Therefore, unsupervised methods are necessary to detect these new threats. The authors focus on DDoS attacks, which have recently caused significant financial and service disruptions for many organisations. As IoT networks grow, these attacks become more sophisticated and harmful. The proposed approach detects zero-day DDoS attacks by using random projection to reduce data dimensionality and an ensemble model combining K-means, Gaussian mixture model, and one-class SVM with a hard voting technique for classification. The method was evaluated using the CIC-DDoS2019 dataset and achieved an accuracy of 94.55%, outperforming other state-of-the-art unsupervised learning methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"513-527"},"PeriodicalIF":1.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective ensemble electricity theft detection algorithm for smart grid","authors":"Chun-Wei Tsai, Chi-Tse Lu, Chun-Hua Li, Shuo-Wen Zhang","doi":"10.1049/ntw2.12132","DOIUrl":"https://doi.org/10.1049/ntw2.12132","url":null,"abstract":"<p>Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develop an effective detection algorithm that leverages the strengths of different learning algorithms. To demonstrate the performance of such an integrated detection model, the algorithm proposed first builds on deep neural networks, a meta-learner for determining the weights of detection models for the construction of an ensemble detection algorithm and then uses a promising metaheuristic algorithm named search economics to optimise the hyperparameters of the meta-learner. Experimental results show that the proposed algorithm is able to find better results and outperforms all the other state-of-the-art detection algorithms for electricity theft detection compared in terms of the accuracy, F1-score, area under the curve of precision-recall (AUC-PR), and area under the curve of receiver operating characteristic (AUC-ROC). Since the results show that the meta-learner of the proposed algorithm can improve the accuracy of deep learning algorithms, the authors expect that it will be used in other deep learning-based applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"471-485"},"PeriodicalIF":1.3,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-09-01DOI: 10.1049/ntw2.12133
Ana Catarina Grilo, Pedro Oliveira, Rui Valadas
{"title":"Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM)","authors":"Ana Catarina Grilo, Pedro Oliveira, Rui Valadas","doi":"10.1049/ntw2.12133","DOIUrl":"https://doi.org/10.1049/ntw2.12133","url":null,"abstract":"<p>Source-specific multicast is a key technology for multicast services such as IPTV broadcasting, which relies on IGMPv3/MLDv2 for source-group membership signalling and multicast routing protocols such as PIM-SSM for building and maintaining receiver-initiated source-based distribution trees across the network. The authors propose the Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM), a novel multicast routing protocol that keeps the design principles of PIM-SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees. The state machines of HPIM-SSM were designed to react promptly to all network events susceptible to reconfiguring the multicast trees, avoiding the need for soft-state maintenance through the periodic transmission of control messages. Moreover, the authors eliminated the need for designated routers, which led to suboptimal trees, and introduced a control-driven assert protocol that operates per source, allowing for considerable memory savings. Finally, the protocol enables the coexistence of multiple unicast routing protocols. HPIM-SSM was implemented in Python, and its correctness was extensively validated through model-checking techniques. Furthermore, a comparison between HPIM-SSM and PIM-SSM was conducted, encompassing both theoretical analysis and experimental evaluation of convergence times. The results demonstrate clearly that HPIM-SSM outperforms PIM-SSM, exhibiting significantly faster convergence times and completely avoiding suboptimal trees.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"486-512"},"PeriodicalIF":1.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12133","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-08-11DOI: 10.1049/ntw2.12131
Nouri Omheni, Anis Amiri, Faouzi Zarai
{"title":"A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks","authors":"Nouri Omheni, Anis Amiri, Faouzi Zarai","doi":"10.1049/ntw2.12131","DOIUrl":"https://doi.org/10.1049/ntw2.12131","url":null,"abstract":"<p>The world of communications technology has recently undergone an extremely significant revolution. This revolution is an immediate consequence of the immersion that the fifth generation B5G and 6G have just brought. The latter responds to the growing need for connectivity and it improves the speeds and qualities of the mobile connection. To improve the energy and spectral efficiency of these types of networks, the non-orthogonal multiple access (NOMA) technique is seen as the key solution that can accommodate more users and dramatically improve spectrum efficiency. The basic idea of NOMA is to achieve multiple access in the power sector and decode the required signal via continuous interference cancelation. A resource allocation approach is proposed for the B5G/6G-NOMA network that aims to maximise system throughput, spectrum and energy efficiency and fairness among users while minimising latency. The proposed approach is based on reinforcement learning (RL) with the use of the Q-Learning algorithm. First, the process of resource allocation as a problem of maximising rewards is formulated. Next, the Q-Learning algorithm is used to design a resource allocation algorithm based on RL. The results of the simulation confirm that the proposed scheme is feasible and efficient.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"455-470"},"PeriodicalIF":1.3,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12131","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-06-30DOI: 10.1049/ntw2.12129
Paul Pop, Konstantinos Alexandris, Tongtong Wang
{"title":"Configuration of multi-shaper Time-Sensitive Networking for industrial applications","authors":"Paul Pop, Konstantinos Alexandris, Tongtong Wang","doi":"10.1049/ntw2.12129","DOIUrl":"https://doi.org/10.1049/ntw2.12129","url":null,"abstract":"<p>IEEE 802.1 Time-Sensitive Networking (TSN) has proposed several shapers, for example, time-aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit-based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi-shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi-CQF combinations. The authors first propose multi-shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi-shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"434-454"},"PeriodicalIF":1.3,"publicationDate":"2024-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-06-18DOI: 10.1049/ntw2.12128
Ziadoon K. Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander, Robiah Yusof, Abdu Saif
{"title":"Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges","authors":"Ziadoon K. Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander, Robiah Yusof, Abdu Saif","doi":"10.1049/ntw2.12128","DOIUrl":"https://doi.org/10.1049/ntw2.12128","url":null,"abstract":"<p>Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta-analysis to provide an in-depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS-based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"339-376"},"PeriodicalIF":1.3,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-06-06DOI: 10.1049/ntw2.12127
Kuan-Chu Lu, I-Hsien Liu, Zong-Chao Liu, Jung-Shian Li
{"title":"Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system","authors":"Kuan-Chu Lu, I-Hsien Liu, Zong-Chao Liu, Jung-Shian Li","doi":"10.1049/ntw2.12127","DOIUrl":"10.1049/ntw2.12127","url":null,"abstract":"<p>Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency, and improved reliability, they are vulnerable to cyberattacks, with consequences ranging from the inconvenience and minor disruption to severe physical damage and even loss of life. The authors evaluate the security of the Dam system in the form of Common Criteria, develop safety goals to improve this safety, and focus on threats and risks to the dam SCADA system. Finally proposes an anomaly-based machine-learning framework for detecting malicious network attacks in the SCADA system of a dam. Three unsupervised classification algorithms are considered: hierarchical clustering, local outlier factor, and isolation forest. It is shown that the hierarchical clustering algorithm achieves the highest precision and F-score of the three algorithms. Overall, the results confirm the effectiveness of anomaly-based detection algorithms in enhancing the robustness of SCADA systems toward malicious attacks. At the same time, it complies with the security objectives of Common Criteria, achieving the safety and protection of the dam.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"546-559"},"PeriodicalIF":1.3,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12127","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141380682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-05-21DOI: 10.1049/ntw2.12126
N. Alsalmi, K. Navaie, H. Rahmani
{"title":"Energy and throughput efficient mobile wireless sensor networks: A deep reinforcement learning approach","authors":"N. Alsalmi, K. Navaie, H. Rahmani","doi":"10.1049/ntw2.12126","DOIUrl":"10.1049/ntw2.12126","url":null,"abstract":"<p>The efficient development of Mobile Wireless Sensor Networks (MWSNs) relies heavily on optimizing two key parameters: Throughput and Energy Consumption. The proposed work investigates network connectivity issues with MWSN and proposes two routing algorithms, namely Self-Organising Maps based-Optimised Link State Routing (SOM-OLSR) and Deep Reinforcement Learning based-Optimised Link State Routing (DRL-OLSR) for MWSNs. The primary objective of the proposed algorithms is to achieve energy-efficient routing while maximizing throughput. The proposed algorithms are evaluated through simulations by considering various performance metrics, including connection probability (CP), end-to-end delay, overhead, network throughput, and energy consumption. The simulation analysis is discussed under three scenarios. The first scenario undertakes ‘no optimisation’, the second considers SOM-OLSR, and the third undertakes DRL-OLSR. A comparison between DRL-OLSR and SOM-OLSR reveals that the former surpasses the latter in terms of low latency and prolonged network lifetime. Specifically, DRL-OLSR demonstrates a 47% increase in throughput, a 67% reduction in energy consumption, and a CP three times higher than SOM-OLSR. Furthermore, when contrasted with the ‘no optimisation’ scenario, DRL-OLSR achieves a remarkable 69.7% higher throughput and nearly 89% lower energy consumption. These findings highlight the effectiveness of the DRL-OLSR approach in wireless sensor networks.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"413-433"},"PeriodicalIF":1.3,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12126","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141118592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2024-04-07DOI: 10.1049/ntw2.12125
Umar Aliyu, Haifa Takruri, Martin Hope, Abubakar Halilu Gidado, Hamid Abubakar Adamu
{"title":"Disaster scenario optimised link state routing protocol and message prioritisation","authors":"Umar Aliyu, Haifa Takruri, Martin Hope, Abubakar Halilu Gidado, Hamid Abubakar Adamu","doi":"10.1049/ntw2.12125","DOIUrl":"10.1049/ntw2.12125","url":null,"abstract":"<p>Natural and artificial (human-made) disasters have been steadily increasing all over the world, signifying the importance of providing reliable and energy friendly communication network to survivors in the aftermath of a disaster. On the other hand, low-battery devices running optimised link state routing (OLSR) protocol often experience quick power failure which restricts their ability to communicate for a necessary period during rescue operations. To extend the lifespans and prioritise message delivery on low-battery devices, the authors examine disaster scenario optimised link state routing (DS-OLSR) protocol ALERT message and propose an innovative solution to prioritise messages based on the device battery energy level, leading to more energy conservation, packet delivery as well as better emotional state of survivors. An ALERT message is a novel message type added to mobile ad-hoc network's (MANET) popular OLSR protocol for energy efficiency. The proposed DS-OLSR Protocol and Message Prioritisation (DS-OLSRMP) as an extension of DS-OLSR modifies the multipoint relay mechanism and uses a prioritisation technique which classify nodes into four priority groups: Critical, High, Medium, and Low priorities. These priority groups help in prioritising both message delivery and message status notifications for devices with low battery energy. The DS-OLSRMP was implemented in a Network Simulator, version 3.29 and compared with DS-OLSR, OLSRv1 and OLSRv2. The simulation results show that DS-OLSRMP performs better than DS-OLSR, OLSRv1 and OLSRv2 in terms of energy conservation and packets delivery in the simulation of both sparse and dense network scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"395-412"},"PeriodicalIF":1.3,"publicationDate":"2024-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12125","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140733221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}