{"title":"NGMA-based intergrated communication and computing for 6G-enabled cognitive radio networks","authors":"Wei Liang, Jiankang Zhang, Dawei Wang, Lixin Li, Soon Xin Ng","doi":"10.1049/ntw2.12102","DOIUrl":"10.1049/ntw2.12102","url":null,"abstract":"<p>According to the urgent low latency and the heavy computation tasks demands required for sixth-generation (6G) wireless networks, the authors introduce the conventional resource allocation algorithms, including the game theory, artificial-intelligence (AI) methods, and matching theory enabled framework, in which the multi-access edge computing (MEC) scheme collaborative with the cloud platform to serve the primary users (PUs) and cognitive users (CUs) for next generation multiple access (NGMA). The proposed framework allows both the PUs and CUs to offload their computation tasks in a 6G-enabled cognitive radio (CR) networks, so called cloud-assisted CR-MEC networks. In particular, the fundamentals of this conceived networks based on NGMA are first introduced. Hence, a number of methods based on the resource allocation algorithms are proposed in order to improve the quality of service for the mobile users, and reduce their transmission latency as well as the energy consumptions. Moreover, the motivations, challenges, and representative models for these conventional algorithms are described for integrated-intelligent communication and computing aided NGMA networks. Furthermore, the open issues and future research directions for this conceived networks are summarised.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 3","pages":"262-269"},"PeriodicalIF":1.4,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12102","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135885435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-09-02DOI: 10.1049/ntw2.12100
Ya Li, Yu Zhang, Xinji Tian, Ruipeng Liu
{"title":"Outage performance prediction of cooperative vehicle network based on sparrow search algorithm based on back-propagation neural network","authors":"Ya Li, Yu Zhang, Xinji Tian, Ruipeng Liu","doi":"10.1049/ntw2.12100","DOIUrl":"10.1049/ntw2.12100","url":null,"abstract":"<p>With the support of the sixth-generation mobile networks (6G) technology, the Internet-of-Vehicle (IoV) can realize the perception and monitoring of vehicle road information. However, due to the change of network topology and various environment, the reliable performance of the communication link is facing challenges. For the sake of improving communication quality, a cooperative vehicular network (CVN) system is established, which adopts cooperative communication and multiple input multiple output (MIMO) technology. According to the signal-to-noise ratio (SNR) threshold of relay vehicles, using hybrid decode-amplify-forward (HDAF) protocol and combining with antenna selection, the analytical expression of outage probability (OP) with Meijer-G function is obtained. For predicting the OP accurately, the sparrow search algorithm based on back-propagation neural network (SSA-BPNN) is put forward. The simulation results show that the cascade order of the channels has a negative effect on the OP. Meanwhile, the prediction accuracy of SSA-BPNN is 64.8% higher than that of BPNN, and 98.96% greater than that of general regression neural network, and the convergence rate is faster than ICS-BPNN.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"45-57"},"PeriodicalIF":1.4,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12100","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43322135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-08-28DOI: 10.1049/ntw2.12098
Mohammad Arafah, Iain Phillips, Asma Adnane
{"title":"Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection","authors":"Mohammad Arafah, Iain Phillips, Asma Adnane","doi":"10.1049/ntw2.12098","DOIUrl":"10.1049/ntw2.12098","url":null,"abstract":"<p>With the increasing rate and types of cyber attacks against information systems and communication infrastructures, many tools are needed to detect and mitigate against such attacks, for example, Intrusion Detection Systems (IDSs). Unfortunately, traditional Signature-based IDSs (SIDSs) perform poorly against previously unseen adversarial attacks. Anomaly-based IDSs (AIDSs) use <i>Machine Learning (ML)</i> and <i>Deep Learning (DL)</i> approaches to overcome these limitations. However, AIDS performance can be poor when trained on imbalanced datasets. To address the challenge of AIDS performance caused by these unbalanced training datasets, generative adversarial models are proposed to obtain adversarial attacks from one side and analyse their quality from another. According to extensive usage and reliability criteria for generative adversarial models in different disciplines, <i>Generative Adversarial Networks (GANs)</i>, <i>Bidirectional GAN (BiGAN)</i>, and <i>Wasserstein GAN (WGAN)</i> are employed to serve AIDS. The authors have extensively assessed their abilities and robustness to deliver high-quality attacks for AIDS. AIDSs are constructed, trained, and tuned based on these models to measure their impacts. The authors have employed two datasets: <i>NSL-KDD</i> and <i>CICIDS-2017</i> for generalisation purposes, where <i>ML</i> and <i>DL</i> approaches are utilised to implement AIDSs. Their results show that the <i>WGAN</i> model outperformed <i>GANs</i> and <i>BiGAN</i> models in binary and multiclass classifications for both datasets.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"28-44"},"PeriodicalIF":1.4,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12098","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45852265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-08-25DOI: 10.1049/ntw2.12101
R. Sri Uma Suseela, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti, Mohammad Akhtaruzzaman
{"title":"Cross layer protocol architecture for spectrum-based routing in cognitive radio networks","authors":"R. Sri Uma Suseela, Korlapati Satyanarayana Murthy, Hima Bindu Valiveti, Mohammad Akhtaruzzaman","doi":"10.1049/ntw2.12101","DOIUrl":"10.1049/ntw2.12101","url":null,"abstract":"<p>New cell phone services and apps consume more spectrum. Wireless spectrum allows services and apps to communicate with one another. Wi-Fi quality is improved via smart spectrum usage and new CRT services. The use of spectrum is beneficial. Cross-layer architecture improves the energy efficiency of wireless networks. System performance is improved by connecting protocol layers. Cross-layer configuration does not introduce layer functionality into a network. By protecting networks, cross-layer design increases communication. C-LNRD uses self-determined time slots to promote communication. Agents that collect information. At each level, the monitoring agent monitors traffic, time, and topology. Each layer of agents has its own database. Data is received by the network, MAC, and physical layers. Based on its measurements, each node grants trust. Routes were altered. PR ATTACK does not have RTS, CTS, or RREQ to reduce false positives. Spectrum allocation is improved via cognitive radio and learning technologies. Adaptive Cognitive Radio Networks are created using AI, GA, Fuzzy Logic, and Game Theory (ACRN). DSA creates high-bandwidth MCRNs. This research looks at MCRNs in order to optimise spectrum usage, throughput, routing delay, and overhead. Multihop, the proposed approach by CRN takes into account spectrum awareness, quality route establishment, and route maintenance in the event that a connection fails due to spectrum or a node transfer. New strategies improve the cross-layer network protocols of MCRN. Learners gain from spectrum models. Sensors and routers are linked by layers. The proposed routing improves both performance and spectrum use.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"58-65"},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42560397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-08-25DOI: 10.1049/ntw2.12099
Vipin Balyan
{"title":"Evaluation of antenna and relay scheme for cooperative non-orthogonal multiple access","authors":"Vipin Balyan","doi":"10.1049/ntw2.12099","DOIUrl":"10.1049/ntw2.12099","url":null,"abstract":"<p>An antenna selection followed by a relay selection scheme (ASRS) is proposed for cooperative non-orthogonal multiple access (NOMA)-based network. The proposed work selects an antenna to maximise the instantaneous rate of poor channel condition users while providing good quality of services (QoS). The outage probability performance of the proposed scheme is plotted for different antenna configuration while varying the SNR and distance with variable number of antennas and available relays. The fairness factor of the proposed work is also discussed, considering three different density areas. The proposed scheme is compared with novel schemes in literature for average sum rate and average energy efficiency to show its superiority.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 2","pages":"115-128"},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12099","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44348643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-08-25DOI: 10.1049/ntw2.12094
Anna Förster, Jens Dede, Andreas Könsgen, Koojana Kuladinithi, Vishnupriya Kuppusamy, Andreas Timm-Giel, Asanga Udugama, Andreas Willig
{"title":"A beginner's guide to infrastructure-less networking concepts","authors":"Anna Förster, Jens Dede, Andreas Könsgen, Koojana Kuladinithi, Vishnupriya Kuppusamy, Andreas Timm-Giel, Asanga Udugama, Andreas Willig","doi":"10.1049/ntw2.12094","DOIUrl":"10.1049/ntw2.12094","url":null,"abstract":"<p>Infrastructure-less networks connect communication devices end-to-end by managing links and routes independent of fixed networking facilities, relying on dedicated protocols running on end-user devices. The large variety of infrastructure-less concepts and related aspects can be confusing both for beginning Ph.D. students as well as experienced researchers who wish to get an overview of neighbouring areas to their own research foci. Frequently discussed topics such as different types of sensor-, vehicular-, or opportunistic networks are covered. The authors describe different networking concepts by looking at aspects such as the main properties, common applications, and ongoing research. Furthermore, the concepts by common characteristics such as node mobility, network density, or power consumption are compared. The authors also discuss network performance evaluation by describing commonly used metrics, different evaluation techniques, and software tools for simulation-based evaluation. The references given in each section help obtain in-depth information about the presented topics and give hints about open research questions, which can be a starting point for own investigations.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"66-110"},"PeriodicalIF":1.4,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42140003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-07-19DOI: 10.1049/ntw2.12096
Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath
{"title":"Vasicek and Van Es entropy-based spectrum sensing for cognitive radios","authors":"Sutapa Sarkar, R. Muralishankar, Sanjeev Gurugopinath","doi":"10.1049/ntw2.12096","DOIUrl":"10.1049/ntw2.12096","url":null,"abstract":"<p>Accurate detection of spectrum holes is a useful requirement for cognitive radios that improves the efficiency of spectrum usage. The authors propose three novel, simple, and entropy-based detectors for spectrum sensing in cognitive radio. The authors evaluate the probability of detection of these three detectors: Vasicek's entropy detector, truncated Vasicek's entropy detector, and Van Es' entropy detector, over a predefined probability of false-alarm. In particular, the authors provide the approximate and asymptotic test statistics for these detectors in the presence and absence of Nakagami-<i>m</i> fading, noise variance uncertainty, and optimised detection threshold. Furthermore, the authors provide a detailed comparison study among all the detectors via Monte Carlo simulations and justify authors results through real-world data. The authors’ experimental results establish a superior performance of truncated Vasicek's entropy detector over Vasicek's entropy detector, energy detector, differential entropy detector and Van Es' entropy detector in practically viable scenarios.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"1-12"},"PeriodicalIF":1.4,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46834973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-07-13DOI: 10.1049/ntw2.12093
Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis
{"title":"Performance evaluation of a mobile hotspot supporting quasi-random traffic","authors":"Marinos Vlasakis, Ioannis Moscholios, Panagiotis Sarigiannidis, Michael Logothetis","doi":"10.1049/ntw2.12093","DOIUrl":"10.1049/ntw2.12093","url":null,"abstract":"<p>The authors study and evaluate a mobility-aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi-random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three-dimensional Markov chains.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"295-304"},"PeriodicalIF":1.4,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46574287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-07-09DOI: 10.1049/ntw2.12097
Ahmed M. Jasim, Hamed Al-Raweshidy
{"title":"Optimal intelligent edge-servers placement in the healthcare field","authors":"Ahmed M. Jasim, Hamed Al-Raweshidy","doi":"10.1049/ntw2.12097","DOIUrl":"10.1049/ntw2.12097","url":null,"abstract":"<p>The efficiency improvement of healthcare systems is a major national goal across the world. However, delivering scalable and reliable healthcare services to people, while managing costs, is a challenging problem. The most promising methods to address this issue are based on smart healthcare (s-health) technologies. Furthermore, the combination of edge computing and s-health can yield additional benefits in terms of delay, bandwidth, power consumption, security, and privacy. However, the strategic placement of edge-servers is crucial to achieve further cost and latency benefits. This article is divided into two parts: an AI-based priority mechanism to identify urgent cases, aimed at improving quality of service and quality of experience is proposed. Then, an optimal edge-servers placement (OESP) algorithm to obtain a cost-efficient architecture with lower delay and complete coverage is presented. The results demonstrate that the proposed priority mechanism algorithms can reduce the latency for patients depending on their number and level of urgency, prioritising those with the greatest need. In addition, the OESP algorithm successfully selects the best sites to deploy edge-servers to achieve a cost-efficient system, with an improvement of more than 80%. In sum, the article introduces an improved healthcare system with commendable performance, enhanced cost-effectiveness, and lower latency.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 1","pages":"13-27"},"PeriodicalIF":1.4,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57810417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deploying cloud-native experimental platforms for zero-touch management 5G and beyond networks","authors":"Sergio Barrachina-Muñoz, Rasoul Nikbakht, Jorge Baranda, Miquel Payaró, Josep Mangues-Bafalluy, Panagiotis Kokkinos, Polyzois Soumplis, Aristotelis Kretsis, Emmanouel Varvarigos","doi":"10.1049/ntw2.12095","DOIUrl":"10.1049/ntw2.12095","url":null,"abstract":"<p>An experimental framework for managing 5G and beyond networks through cloud-native deployments and end-to-end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi-domain network spanning cloud and edge hosts. End-to-end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re-selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero-touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"305-315"},"PeriodicalIF":1.4,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47441135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}