ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.04.007
{"title":"Hybrid Approach with Membership-Density Based Oversampling for handling multi-class imbalance in Internet Traffic Identification with overlapping and noise","authors":"","doi":"10.1016/j.icte.2024.04.007","DOIUrl":"10.1016/j.icte.2024.04.007","url":null,"abstract":"<div><div>Internet Traffic identification is a crucial method for monitoring Internet application activities and is essential for Internet management and security. Internet traffic data typically displays imbalanced distributions. The uneven distribution of instances in each class indicates the class imbalance problem. This problem can cause a decrease in classification performance because the classifier assumes the dataset has a balanced class distribution. Internet Traffic Identification dataset is often accompanied by overlapping and noise. The hybrid approach to handling class imbalances involving data-level and ensemble-based approaches is usually chosen to overcome this problem. Data-level with oversampling using SMOTE is the choice because of its ability to synthesize new samples for minority classes. However, SMOTE-generated samples tend to be noisy and overlap with the majority of samples. This research proposes the application of a Hybrid Approach with Membership-density-based Oversampling to tackle this challenge. This research emphasizes the importance of applying membership degrees in determining samples that will group samples into safe, overlapping, and noisy areas. Then, top samples will be selected based on density ratio, stability, and score for safe and overlapping safe areas. The study findings that the proposed method effectively addresses multi-class imbalances in six Internet Traffic Identification datasets, yielding slightly improved average accuracy, <span><math><mrow><msub><mrow><mi>F</mi></mrow><mrow><mi>b</mi></mrow></msub><mi>M</mi><mi>e</mi><mi>a</mi><mi>s</mi><mi>u</mi><mi>r</mi><mo>,</mo></mrow></math></span> and class balance accuracy results compared to other testing methods, though the difference is not statistically significant. The noise and overlapping scenes experiments demonstrate that the average accuracy obtained is superior, showing a considerable difference compared to all test methods.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1094-1102"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140759700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.006
Sohrab Khan , Sheharyar Khan , Adel Sulaiman , Mana Saleh Al Reshan , Hani Alshahrani , Asadullah Shaikh
{"title":"Deep neural network and trust management approach to secure smart transportation data in sustainable smart cities","authors":"Sohrab Khan , Sheharyar Khan , Adel Sulaiman , Mana Saleh Al Reshan , Hani Alshahrani , Asadullah Shaikh","doi":"10.1016/j.icte.2024.08.006","DOIUrl":"10.1016/j.icte.2024.08.006","url":null,"abstract":"<div><div>Smart transportation, powered by IoT, transforms mobility with interconnected sensors and devices collecting real-time data on traffic, vehicle locations, and passenger needs. This fosters a safer and more sustainable transportation ecosystem, optimizing traffic flow and enhancing public transit efficiency. However, security and privacy challenges emerge in smart transportation systems. Our proposed solution involves a deep neural network (DNN) model trained on extensive datasets from sustainable cities, incorporating historical information like traffic patterns and sensor readings. This model identifies potential malicious nodes, achieving a 90% accuracy rate in predicting threats such as Denial of Service 88%, Whitewash attacks 80%, and Brute Force attacks 75%. This high precision ensures the security and privacy of passenger vehicle data and routes.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1059-1065"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.008
Anizah Abu Bakar, Azizul Rahman Mohd Shariff, Chan Jia Huei, Suzi Iryanti Fadilah
{"title":"The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates","authors":"Anizah Abu Bakar, Azizul Rahman Mohd Shariff, Chan Jia Huei, Suzi Iryanti Fadilah","doi":"10.1016/j.icte.2024.07.008","DOIUrl":"10.1016/j.icte.2024.07.008","url":null,"abstract":"<div><div>The increasing reliance on smartphones necessitates secure, accurate user identification methods. This study introduces “digital pheromones”, a novel digital identity creation method based on smartphone user behaviors. Represented by a 56-bit binary number, this identity is derived from quantization and concatenation of 14 time-varying smartphone variables. Motivated by the need for enhanced security and privacy, the study employs statistical analysis to measure user behavior dispersion, showing that wider dispersion variables facilitate faster user uniqueness at lower quantization levels. The results demonstrate 100% uniqueness, ensuring no two users share the same 56-bit identity. This research offers a robust framework for future advancements in smartphone user authentication and identification systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 981-988"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.03.006
{"title":"Symbol-level precoding scheme robust to channel estimation errors in wireless fading channels","authors":"","doi":"10.1016/j.icte.2024.03.006","DOIUrl":"10.1016/j.icte.2024.03.006","url":null,"abstract":"<div><div>Most studies on symbol-level (SL) precoding have assumed that channel estimation is perfect. However, because interference signals or additive white Gaussian noise exist in the received signal for channel estimation, channel estimation errors always exist. In this paper, we propose an SL precoding scheme that is robust to channel estimation errors. First, using the characteristics of the channel estimation errors, we derive an equation for the worst-case mean squared error (MSE) which is the maximum of the MSE. Then by designing the SL precoding to minimize the worst-case MSE, it has robust characteristics against channel estimation errors.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1066-1072"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.04.008
{"title":"Integrated beamforming and trajectory optimization algorithm for RIS-assisted UAV system","authors":"","doi":"10.1016/j.icte.2024.04.008","DOIUrl":"10.1016/j.icte.2024.04.008","url":null,"abstract":"<div><div>Unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs) have garnered considerable research interest in the fields of 5G and 6G wireless communication due to their remarkable flexibility and cost-effectiveness. However, the inherent openness of wireless communication environments renders these technologies vulnerable to eavesdropping. This paper presents a penalty-based successive convex approximation algorithm and a minorize–maximization algorithm to optimize the transmission beamforming vector, RIS beamforming vector, and UAV–RIS trajectory. The objective of this study was to enhance the physical layer security performance of wireless communication systems using UAVs and RISs. Our simulation results demonstrate that the proposed technique achieves a higher security transmission rate compared to existing techniques.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1080-1086"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140762996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.007
Mustafa Ergen , Bilal Saoud , Ibraheem Shayea , Ayman A. El-Saleh , Onur Ergen , Feride Inan , Mehmet Fatih Tuysuz
{"title":"Edge computing in future wireless networks: A comprehensive evaluation and vision for 6G and beyond","authors":"Mustafa Ergen , Bilal Saoud , Ibraheem Shayea , Ayman A. El-Saleh , Onur Ergen , Feride Inan , Mehmet Fatih Tuysuz","doi":"10.1016/j.icte.2024.08.007","DOIUrl":"10.1016/j.icte.2024.08.007","url":null,"abstract":"<div><div>Future internet aims to function as a neutral in-network storage and computation platform, essential for enabling 6G and beyond wireless use cases. Information-Centric Networking and Edge Computing are key paradigms driving this vision by offering diversified services with fast response times across heterogeneous networks. This approach requires effective coordination to dynamically utilize resources like links, storage, and computation in near real-time within a non-homogenous and distributed computing environment. Additionally, networks must be aware of resource availability and reputational information to manage unknown and partially observed dynamic systems, ensuring the desired Quality of Experience (QoE). This paper provides a comprehensive evaluation of edge computing technologies, starting with an introduction to its architectural frameworks. We examine contemporary research on essential aspects such as resource allocation, computation delegation, data administration, and network management, highlighting existing research gaps. Furthermore, we explore the synergy between edge computing and 5G, and discuss advancements in 6G that enhance solutions through edge computing. Our study emphasizes the importance of integrating edge computing in future considerations, particularly regarding sustainable energy and standards.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1151-1173"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.07.007
Radityo Fajar Pamungkas, Ida Bagus Krishna Yoga Utama, Khairi Hindriyandhito, Yeong Min Jang
{"title":"A hybrid approach of ConvLSTMBNN-DT and GPT-4 for real-time anomaly detection decision support in edge–cloud environments","authors":"Radityo Fajar Pamungkas, Ida Bagus Krishna Yoga Utama, Khairi Hindriyandhito, Yeong Min Jang","doi":"10.1016/j.icte.2024.07.007","DOIUrl":"10.1016/j.icte.2024.07.007","url":null,"abstract":"<div><div>Anomaly detection is a critical requirement across diverse domains to promptly identify abnormal behavior. Conventional approaches often face limitations with uninterpretable anomaly detection results, impeding efficient decision-making processes. This paper introduces a novel hybrid approach, the convolutional LSTM Bayesian neural network with nonparametric dynamic thresholding (ConvLSTMBNN-DT) for prediction-based anomaly detection. In addition, the model integrates fine-tuned generative pre-training version 4 (GPT-4) to provide human-interpretable explanations in edge–cloud environments. The proposed method demonstrates exceptional performance, achieving an average <span><math><mrow><mi>F</mi><mn>1</mn><mo>−</mo><mi>s</mi><mi>c</mi><mi>o</mi><mi>r</mi><mi>e</mi></mrow></math></span> of 0.91 and an area under the receiver operating characteristic curve (<span><math><mrow><mi>A</mi><mi>U</mi><mi>C</mi></mrow></math></span>) of 0.86. Additionally, it effectively offers comprehensible decision-support explanations.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1026-1033"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.08.005
Han Seung Jang , Munseop Yun , Taehoon Kim , Inkyu Bang
{"title":"Non-orthogonal resource scheduling with enhanced preamble detection method for cellular random access networks","authors":"Han Seung Jang , Munseop Yun , Taehoon Kim , Inkyu Bang","doi":"10.1016/j.icte.2024.08.005","DOIUrl":"10.1016/j.icte.2024.08.005","url":null,"abstract":"<div><div>In this article, we propose a non-orthogonal resource scheduling (NORS) scheme with an enhanced preamble detection (PD) method for cellular random access (RA) systems. The enhanced PD method is designed based on a deep learning technique that can classify three PD statuses: idle, collision-free, and collision. Because of this collision resolution capability, the base station (BS) can exploit radio resources non-orthogonally in contention-based RA protocols. In addition, we mathematically analyze the performance of our proposed NORS scheme in terms of RA success probability and resource utilization efficiency and conduct a comparison with the baseline orthogonal resource scheduling (ORS) scheme. Through simulations, we verify the validity of our mathematical analysis. As a result, our results will be a useful guideline for resource scheduling and provide support for massive connectivity.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1117-1123"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142433174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.03.004
{"title":"Performance analysis of multi-hop low earth orbit satellite network over mixed RF/FSO links","authors":"","doi":"10.1016/j.icte.2024.03.004","DOIUrl":"10.1016/j.icte.2024.03.004","url":null,"abstract":"<div><div>Low earth orbit satellite (LEOS) communication has emerged as a promising technology to achieve global coverage, while further reducing the end-to-end latency by establishing communication link between LEOSs. In this paper, we analyze the performance of multi-hop LEOS network in terms of bit error rate (BER) and outage probability over mixed radio frequency (RF)/free space optical (FSO) links where RF link is used for the link between ground terminal and LEOS and FSO link is used for establishing inter-satellite links (ISLs). The derived closed-form results are confirmed via Monte Carlo simulations and we show the effect of the number of satellite hops on outage probability and average BER performance by comparing scenarios both with and without ISLs.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1051-1058"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICT ExpressPub Date : 2024-10-01DOI: 10.1016/j.icte.2024.04.003
{"title":"RIS-aided double beamforming optimization algorithm for improving secrecy rate in space–ground integrated networks","authors":"","doi":"10.1016/j.icte.2024.04.003","DOIUrl":"10.1016/j.icte.2024.04.003","url":null,"abstract":"<div><div>The high-frequency band, crucial for supporting the 5G/6G system, faces challenges of signal obstruction by obstacles. This is attributed to significant path loss resulting from radio straightness and short radio distance. To address these challenges, there is a growing interest in leveraging non-terrestrial networks (NTNs) and reconfigurable intelligent surfaces (RISs), utilizing high-altitude satellites as base stations or terminals. Within a three-dimensional NTN system, the vulnerability of wireless signals to eavesdropping due to the open nature of the environment is a notable drawback. To mitigate this vulnerability, this paper introduces an algorithm designed to maximize the secrecy rate. The proposed algorithm optimizes security performance by fine-tuning the base station and RIS beamforming vectors. This optimization is achieved through successive convex approximation and minorization–maximization algorithms. Simulation results affirm the superiority of the proposed algorithm in terms of secrecy rate over existing techniques.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 5","pages":"Pages 1073-1079"},"PeriodicalIF":4.1,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140763047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}