Print ISSN 2047-4954
Latest content
-
Data security in smart devices: Advancement, constraints and future recommendations
- Author(s): Zhang Wenhua ; Mohammad Kamrul Hasan ; Ahmad Fadzil Ismail ; Zhang Yanke ; Md Abdur Razzaque ; Shayla Islam ; Budati Anil kumar
- + Show details - Hide details
-
p.
269
–281
(13)
AbstractNetwork security protocols are implemented to address network security challenges. Computer networks and applications have advanced and developed significantly in recent years, but consumers ‘excitement for network technology and high‐tech devices has been dampened by continual exposure to data security vulnerabilities. As of now, some individuals refuse to use smart devices due to concerns about the authenticity, confidentiality and integrity of data security leaks. This not only prompts Internet service providers to follow market protection mechanisms but also requires software developers to apply appropriate security protocols to protect computer network security. These applications’ dependability and integrity are dependent not just on the effectiveness of cryptographic algorithms, but also on key management protocols. Understanding network security protocols and implementing high‐quality standards to govern the transmission of data in the network are critical components of guaranteeing network security. The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised, and future trends in cybersecurity are discussed.
The article explores data security, primarily at the application layer, various attack methods for different network security protocols and highlights the potential security implications. The study also looks at the corresponding, practical security measures and future research prospects for certain kinds of attacks. Finally, some technical challenges that remain unsolved at the time of writing are summarised and future trends in cybersecurity are discussed.image
-
Norm‐based spectrum sensing for cognitive radios under generalised Gaussian noise
- Author(s): Arati Halaki ; Sutapa Sarkar ; Sanjeev Gurugopinath ; Muralishankar R
- + Show details - Hide details
-
p.
282
–294
(13)
AbstractCognitive radio (CR) systems are configured to dynamically assess the spectrum utilisation and contribute towards an improved spectrum efficiency. Hence, accurate detection of the incumbent signal in a given channel, popularly known as spectrum sensing (SS), is essential for CR. Here, in the domain of SS, the authors introduce a new goodness‐of‐fit test (GoFT) founded on p‐norm of the observations at the receiver node. To capture the heavy‐tailed nature of noise distribution in practical communication channels, the authors utilise generalised Gaussian distribution (GGD) as a noise model. A novel p‐norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under GGD is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. Using Neyman‐Pearson framework the performances of PND and GPD are compared with an existing differential entropy detector (DED), the well‐known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real‐world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.
A novel p‐norm detector (PND) and a geometric power detector (GPD) is proposed and corresponding probability density function (PDF) under generalised Gaussian distribution (GGD) is derived. Via Monte Carlo simulations, the authors show a match of the derived PDFs with the simulation results. The performances of PND and GPD are compared with an existing differential entropy detector (DED), the well‐known energy detector (ED) and joint correlation and energy detector (CED) under GGD noise model. Evaluation of proposed PND and GPD utilising Monte Carlo simulations indicate a superior performance. Further, the experiments employing real‐world data establish superiority of the proposed detectors as compared to existing techniques. The authors derive and implement an optimised threshold for PND, providing further improvement in performance.image
-
Performance evaluation of a mobile hotspot supporting quasi‐random traffic
- Author(s): Marinos Vlasakis ; Ioannis Moscholios ; Panagiotis Sarigiannidis ; Michael Logothetis
- + Show details - Hide details
-
p.
295
–304
(10)
AbstractThe authors study and evaluate a mobility‐aware call admission control algorithm in a mobile hotspot. More specifically, a vehicle which has an access point of a fixed capacity and may alternate between stop and moving phases is considered. In the stop phase, the vehicle services new and handover calls. To prioritise handover calls a probabilistic bandwidth reservation policy is considered where a fraction of the capacity is reserved for handover calls. Based on this policy, new calls may enter the reservation space with a predefined probability. In addition, handover calls have the option to wait in a queue of finite size if there are no available resources at the time of their arrival. In the moving phase, the vehicle services only new calls under the classical complete sharing policy. In both phases, calls arrive in the system according to a quasi‐random process, require a single bandwidth unit for their acceptance in the system and have an exponentially distributed service time. To analytically determine the various performance measures, such as time congestion probabilities, call blocking probabilities and link utilisation, an accurate analytical method is presented based on three‐dimensional Markov chains.
The authors study and evaluate a mobility‐aware call admission control algorithm in a mobile hotspot that serves quasi‐random traffic.image
-
Deploying cloud‐native experimental platforms for zero‐touch management 5G and beyond networks
- Author(s): Sergio Barrachina‐Muñoz ; Rasoul Nikbakht ; Jorge Baranda ; Miquel Payaró ; Josep Mangues‐Bafalluy ; Panagiotis Kokkinos ; Polyzois Soumplis ; Aristotelis Kretsis ; Emmanouel Varvarigos
- + Show details - Hide details
-
p.
305
–315
(11)
AbstractAn experimental framework for managing 5G and beyond networks through cloud‐native deployments and end‐to‐end monitoring is presented. The framework uses containerised network functions in a Kubernetes cluster across a multi‐domain network spanning cloud and edge hosts. End‐to‐end monitoring is demonstrated through Grafana dashboards that showcase both infrastructure resources and radio metrics in two scenarios involving UPF re‐selection and user mobility. As a third scenario, the authors demonstrate how a decision engine interacts with the experimental platform to perform zero‐touch containerised application relocation, highlighting the potential for enabling dynamic and intelligent management of 5G networks and beyond.
This paper presents a framework for managing 5G and future networks using cloud‐native deployments and end‐to‐end monitoring. The framework uses containerised network functions in a Kubernetes cluster across a multi‐domain network that spans cloud and edge hosts. End‐to‐end monitoring is demonstrated through Grafana dashboards that show both infrastructure resources and radio metrics in two scenarios involving UPF re‐selection and user mobility. As a third scenario, how a decision engine can interact with the experimental platform to perform zero‐touch containerised application relocation is demonstrated, showing the potential for enabling dynamic and intelligent management of 5G networks and beyond.image
Most downloaded
Most cited
-
Theoretical modelling of fog computing: a green computing paradigm to support IoT applications
- Author(s): Subhadeep Sarkar and Sudip Misra
-
IoT technologies for smart cities
- Author(s): Badis Hammi ; Rida Khatoun ; Sherali Zeadally ; Achraf Fayad ; Lyes Khoukhi
-
Monetization of IoT data using smart contracts
- Author(s): Ahmed Suliman ; Zainab Husain ; Menatallah Abououf ; Mansoor Alblooshi ; Khaled Salah
-
SCGRP: SDN-enabled connectivity-aware geographical routing protocol of VANETs for urban environment
- Author(s): Dharani Kumari Nooji Venkatramana ; Shylaja Banagiri Srikantaiah ; Jayalakshmi Moodabidri
-
Ellipse fitting model for improving the effectiveness of life-logging physical activity measures in an Internet of Things environment
- Author(s): Jun Qi ; Po Yang ; Martin Hanneghan ; Dina Fan ; Zhikun Deng ; Feng Dong