IET NetworksPub Date : 2023-07-19DOI: 10.1049/ntw2.12096
Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath
{"title":"Vasicek and Van Es entropy-based spectrum sensing for cognitive radios","authors":"Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath","doi":"10.1049/ntw2.12096","DOIUrl":"10.1049/ntw2.12096","url":null,"abstract":"<p>Accurate detection of spectrum holes is a useful requirement for cognitive radios that improves the efficiency of spectrum usage. The authors propose three novel, simple, and entropy-based detectors for spectrum sensing in cognitive radio. The authors evaluate the probability of detection of these three detectors: Vasicek's entropy detector, truncated Vasicek's entropy detector, and Van Es' entropy detector, over a predefined probability of false-alarm. In particular, the authors provide the approximate and asymptotic test statistics for these detectors in the presence and absence of Nakagami-<i>m</i> fading, noise variance uncertainty, and optimised detection threshold. Furthermore, the authors provide a detailed comparison study among all the detectors via Monte Carlo simulations and justify authors results through real-world data. The authors’ experimental results establish a superior performance of truncated Vasicek's entropy detector over Vasicek's entropy detector, energy detector, differential entropy detector and Van Es' entropy detector in practically viable scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-07-13DOI: 10.1049/ntw2.12093
Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis
{"title":"Performance evaluation of a mobile hotspot supporting quasi-random traffic","authors":"Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis","doi":"10.1049/ntw2.12093","DOIUrl":"10.1049/ntw2.12093","url":null,"abstract":"<p>The authors study and evaluate a mobility-aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi-random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three-dimensional Markov chains.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46574287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-07-09DOI: 10.1049/ntw2.12097
Ahmed M. Jasim, Hamed Al-Raweshidy
{"title":"Optimal intelligent edge-servers placement in the healthcare field","authors":"Ahmed M. Jasim, Hamed Al-Raweshidy","doi":"10.1049/ntw2.12097","DOIUrl":"10.1049/ntw2.12097","url":null,"abstract":"<p>The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57810417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks","authors":"Sergio Barrachina-Muñoz, Rasoul Nikbakht, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy, Panagiotis Kokkinos, Polyzois Soumplis, Aristotelis Kretsis, Emmanouel Varvarigos","doi":"10.1049/ntw2.12095","DOIUrl":"10.1049/ntw2.12095","url":null,"abstract":"<p>An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47441135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-07-05DOI: 10.1049/ntw2.12089
George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis
{"title":"Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios","authors":"George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis","doi":"10.1049/ntw2.12089","DOIUrl":"10.1049/ntw2.12089","url":null,"abstract":"<p>Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49499420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-28DOI: 10.1049/ntw2.12092
Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R
{"title":"Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise","authors":"Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R","doi":"10.1049/ntw2.12092","DOIUrl":"10.1049/ntw2.12092","url":null,"abstract":"<p>Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on <i>p</i>-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44089493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-27DOI: 10.1049/ntw2.12090
Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou
{"title":"Optimal resource optimisation based on multi-layer monitoring","authors":"Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou","doi":"10.1049/ntw2.12090","DOIUrl":"10.1049/ntw2.12090","url":null,"abstract":"<p>The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47856156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-21DOI: 10.1049/ntw2.12091
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar
{"title":"Data security in smart devices: Advancement, constraints and future recommendations","authors":"Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar","doi":"10.1049/ntw2.12091","DOIUrl":"10.1049/ntw2.12091","url":null,"abstract":"<p>Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46701729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-20DOI: 10.1049/ntw2.12088
Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir
{"title":"A multi-device user authentication mechanism for Internet of Things","authors":"Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir","doi":"10.1049/ntw2.12088","DOIUrl":"https://doi.org/10.1049/ntw2.12088","url":null,"abstract":"<p>The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-05DOI: 10.1049/ntw2.12087
Samraa Adnan Al-Asadi, Safaa O. Al-Mamory
{"title":"A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints","authors":"Samraa Adnan Al-Asadi, Safaa O. Al-Mamory","doi":"10.1049/ntw2.12087","DOIUrl":"10.1049/ntw2.12087","url":null,"abstract":"<p>Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49128988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}