IET NetworksPub Date : 2023-07-05DOI: 10.1049/ntw2.12089
George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis
{"title":"Anchored self-similar 3D Gauss-Markov mobility model for ad hoc routing scenarios","authors":"George Amponis, Thomas Lagkas, Vasileios Argyriou, Ioannis Moscholios, Maria Zevgara, Savvas Ouzounidis, Panagiotis Sarigiannidis","doi":"10.1049/ntw2.12089","DOIUrl":"10.1049/ntw2.12089","url":null,"abstract":"<p>Given the observed developments of novel communication modes and the establishment of next-generation cellular networks, mobility modelling and ad hoc routing requirements have emerged. Flying ad hoc networks are key pivots in enabling technological leaps in the domain of on-demand communications, especially in emergency scenarios; as such, resorting to application- and mobility-aware routing is a promising enabler of this emerging set of use cases. This article investigates swarm mobility modelling, and applicable routing protocols, conducting comparative analysis that leads to the introduction of the new Anchored Self-Similar 3D Gauss-Markov Mobility Model (ASSGM-3D), which incorporates a novel set of spatio-temporal statistical metrics.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"250-259"},"PeriodicalIF":1.4,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49499420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-28DOI: 10.1049/ntw2.12092
Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R
{"title":"Norm-based spectrum sensing for cognitive radios under generalised Gaussian noise","authors":"Arati Halaki, Sutapa Sarkar, Sanjeev Gurugopinath, Muralishankar R","doi":"10.1049/ntw2.12092","DOIUrl":"10.1049/ntw2.12092","url":null,"abstract":"<p>Cognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness-of-fit test (GoFT) founded on <i>p</i>-norm of the observations at the receiver node. To capture the heavy-tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p-norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman-Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well-known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real-world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"282-294"},"PeriodicalIF":1.4,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44089493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-27DOI: 10.1049/ntw2.12090
Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou
{"title":"Optimal resource optimisation based on multi-layer monitoring","authors":"Dimitrios Uzunidis, Panagiotis Karkazis, Helen C. Leligou","doi":"10.1049/ntw2.12090","DOIUrl":"10.1049/ntw2.12090","url":null,"abstract":"<p>The satisfaction of the Quality of Service (QoS) levels during an entire service life-cycle is one of the key targets for Service Providers (SP). To achieve this in an optimal way, it is required to predict the exact amount of the needed physical and virtual resources, for example, CPU and memory usage, for any possible combination of parameters that affect the system workload, such as number of users, duration of each request, etc. To solve this problem, the authors introduce a novel architecture and its open-source implementation that a) monitors and collects data from heterogeneous resources, b) uses them to train machine learning models and c) tailors them to each particular service type. The candidate solution is validated in two real-life services showing very good accuracy in predicting the required resources for a large number of operational configurations where a data augmentation method is also applied to further decrease the estimation error up to 32%.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"260-267"},"PeriodicalIF":1.4,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47856156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-21DOI: 10.1049/ntw2.12091
Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar
{"title":"Data security in smart devices: Advancement, constraints and future recommendations","authors":"Zhang Wenhua, Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Zhang Yanke, Md Abdur Razzaque, Shayla Islam, Budati Anil kumar","doi":"10.1049/ntw2.12091","DOIUrl":"10.1049/ntw2.12091","url":null,"abstract":"<p>Network security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high-tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high-quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 6","pages":"269-281"},"PeriodicalIF":1.4,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46701729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-20DOI: 10.1049/ntw2.12088
Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir
{"title":"A multi-device user authentication mechanism for Internet of Things","authors":"Raihan Dewon Eman, Mosarrat Jahan, Upama Kabir","doi":"10.1049/ntw2.12088","DOIUrl":"https://doi.org/10.1049/ntw2.12088","url":null,"abstract":"<p>The advent of the Internet of Things (IoT) enables different customized services to ease the day-to-day life activities of users by utilizing information attained through the internet connectivity of low-powered sensing devices. Due to device diversity and resource constraints of participating devices, IoT is vulnerable to security attacks. Consequently, authentication is the fundamental measure for using IoT services in the context of network security. IoT devices’ resource captivity makes designing robust and secure authentication mechanisms challenging. Besides, existing user authentication mechanisms are designed assuming a user always accesses an IoT environment using a particular device. However, nowadays, most users employ multiple devices to access the internet; subsequently, it needs an authentication mechanism to handle this diversity. This paper addresses this limitation and proposes a new One-Time Password (OTP)-based user authentication scheme supporting user access from multiple devices in an IoT environment. We verify the proposed scheme using widely used BAN logic, AVISPA tool, and informal security analysis, guaranteeing that our scheme preserves the necessary security features. Comparative performance analysis shows that our scheme achieves comparable computation, storage, and communication costs concerning existing works. Moreover, simulation results demonstrate that the proposed method also sustains satisfactory network performance.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"229-249"},"PeriodicalIF":1.4,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-06-05DOI: 10.1049/ntw2.12087
Samraa Adnan Al-Asadi, Safaa O. Al-Mamory
{"title":"A survey on edge and fog nodes' placement methods, techniques, parameters, and constraints","authors":"Samraa Adnan Al-Asadi, Safaa O. Al-Mamory","doi":"10.1049/ntw2.12087","DOIUrl":"10.1049/ntw2.12087","url":null,"abstract":"<p>Within Edge and Fog computing, edge and fog nodes must be optimally located at the network edge to minimise the network's overall latency. This survey addresses all aspects of these nodes' placement problems. Literature on edge and fog nodes' placement is collected from reputable databases (IEEE Xplore digital library, Scopus, ScienceDirect, and Web of Science) using a search query. Manual search using keywords and the snowball method is also used to get as many related papers as possible. According to defined inclusion criteria, retrieved documents are filtered to 64 articles for eight years (2015–2022). Depending on the optimisation method used, literature is classified into six categories. The first relies on Integer programming, accounting for 20.3% (13/64). The second category depends on heuristic and metaheuristic methods, accounting for 20.3% (13/64). The third category depends on hybrid methods between the two aforementioned categories accounting for 18.7% (12/64). Forth category depends on clustering methods, accounting for 11% (7/64). The fifth category depends on reinforcement learning, accounting for 6.3% (4/64). And the final category depends on the hybrid methods between two or more methods mentioned above, accounting for 23.4% (15/64). Papers have been analysed to get information like the optimisation problem, the method used for solving it, considered parameters, objectives, constraints, implementation tools, and evaluation methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 5","pages":"197-228"},"PeriodicalIF":1.4,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49128988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-05-27DOI: 10.1049/ntw2.12085
Ana Subtil, M. Rosário Oliveira, Rui Valadas, Paulo Salvador, António Pacheco
{"title":"Detection of Internet-wide traffic redirection attacks using machine learning techniques","authors":"Ana Subtil, M. Rosário Oliveira, Rui Valadas, Paulo Salvador, António Pacheco","doi":"10.1049/ntw2.12085","DOIUrl":"10.1049/ntw2.12085","url":null,"abstract":"<p>Internet-wide traffic redirection attacks have been reported for long, and are mainly caused by Border Gateway Protocol route hijacking. Such attacks can be quite harmful, impairing access to popular Internet sites for long periods. This work addresses the use of machine learning techniques (both unsupervised and supervised) leveraging from a distributed monitoring infrastructure of probes that measure the round trip time to Internet sites under surveillance. The detection process is separated into two stages: per-probe classification and a combination of individual probe decisions. Our results show that the best strategy is to classify using an unsupervised technique based on Tukey's method and to combine using Hidden Markov Models, due to its performance and adaptability to different attack types.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 4","pages":"179-195"},"PeriodicalIF":1.4,"publicationDate":"2023-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48303880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-05-19DOI: 10.1049/ntw2.12086
Barbara Guidi, Ombretta Gaggi, Andrea Michienzi
{"title":"Guest Editorial: Blockchain and decentralised solutions for social good","authors":"Barbara Guidi, Ombretta Gaggi, Andrea Michienzi","doi":"10.1049/ntw2.12086","DOIUrl":"10.1049/ntw2.12086","url":null,"abstract":"<p>Social good can be defined as actions or tools that provide some sort of positive impact on people and society. In recent years, the scientific community has seen an increase in research relating to social good. In terms of technology, Blockchain, distributed ledger technologies and decentralised technologies in general such as the Interplanetary File System (IPFS), have had a positive impact towards improving social good, such as by introducing transparency, trust and security in supply chains, data sharing and other social good applications.</p><p>The aim of this Special Issue is to address the following question: ‘How does Blockchain impact the social good, and how can decentralisation improve ICT industries?’ In particular, blockchain technology can be a driver of innovation and have positive effects on our society, industry, legal systems and economic/financial systems by introducing trust among untrusted parties. Additionally, decentralised technologies can help democratise how services are delivered, therefore increasing the interoperability, transparency and security of Internet services. Lastly, the impact, future and limitations of all these technologies have different effects across specific domains, like industry, economy, society, law, etc.</p><p>A wide variety of research is being conducted to explore and discover possible challenges and opportunities to exploit blockchain and decentralised solutions for social good. This Special Issue is focused on research ideas, articles and experimental studies related to ‘Blockchain and Decentralized Solutions for Social Good’ that will advance knowledge concerning the application of the aforementioned technologies in the wide spectrum of social good.</p><p>This Special Issue is composed of four peer-reviewed papers of excellent quality.</p><p>Zichichi et al. propose a system for complex queries over Distributed Hash Tables or Distributed File Systems. The system makes use of a hypercube peer-to-peer overlay which manages the queries to be done on data. Each layer of the hypercube corresponds to specific keywords that are associated with the underlying data. Additionally, the paper proposes to introduce a governance layer to improve the decentralisation and scalability of the system. In particular, the governance layer is built using a Decentralised Autonomous Organization that manages rewards and organizational decisions by leveraging smart contracts. Lastly, the authors show the application of the system to geodata storing and retrieval. Thanks to a thorough evaluation, the authors show the benefit in terms of the performance of the hypercube overlay network, the overall time required to perform complex queries and the cost of the smart contracts.</p><p>Bapatla et al. propose PharmaChain, a supply chain network specifically designed to prevent the circulation of counterfeit pharmaceuticals. Pharmachain is divided into five logical components: IoT sensors to be installed on transport trucks","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 4","pages":"153-154"},"PeriodicalIF":1.4,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43102231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-03-23DOI: 10.1049/ntw2.12084
Z. Albataineh, Khaled F. Hayajneh, Haythem A. Bany Salameh, Raed Al Al Athamneh, Y. Jararweh
{"title":"Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm","authors":"Z. Albataineh, Khaled F. Hayajneh, Haythem A. Bany Salameh, Raed Al Al Athamneh, Y. Jararweh","doi":"10.1049/ntw2.12084","DOIUrl":"https://doi.org/10.1049/ntw2.12084","url":null,"abstract":"","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":" ","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45122380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IET NetworksPub Date : 2023-03-23DOI: 10.1049/ntw2.12083
{"title":"CORRIGENDUM: Predicting household water use behaviour for improved hygiene practices in internet of things environment via dynamic behaviour intervention model","authors":"","doi":"10.1049/ntw2.12083","DOIUrl":"https://doi.org/10.1049/ntw2.12083","url":null,"abstract":"<p>Below content is reversed to correct an error of citation in our original publication in journal IET Networks [<span>1</span>].</p><p>On page 147, Figure 3 title is to be replaced as ‘Fig 3. ETPB model path analyses [<span>2</span>] and variable definition’.</p><p>On page 146, Section 3.3, the sentence ‘As classical SEM model only represents a static system and cannot express behaviour change over time, to expand the ETPB SEM model with dynamic effects, we proposed a fluid analogy to postulate and parallel inventory management in supply chains’ has to be replaced as ‘As classical SEM model only represents a static system and cannot express behaviour change over time, to expand the ETPB SEM model with dynamic effects, we utilised a fluid analogy [<span>2</span>] to postulate and parallel inventory management in supply chains’.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"12 3","pages":"152"},"PeriodicalIF":1.4,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50153702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}