Article
Chemistry, Analytical
Mahrukh Ramzan, Muhammad Shoaib, Ayesha Altaf, Shazia Arshad, Faiza Iqbal, Angel Kuc Castilla, Imran Ashraf
Summary: Internet security is a major concern due to the increasing demand for IT-based platforms and cloud computing. Traditional solutions are ineffective in detecting complex network attacks, but deep learning models based on artificial intelligence show exceptional performance in detecting DDoS attacks.
Article
Computer Science, Information Systems
Furqan Rustam, Muhammad Faheem Mushtaq, Ameer Hamza, Muhammad Shoaib Farooq, Anca Delia Jurcut, Imran Ashraf
Summary: This research proposes a machine learning-based framework to detect distributed DOS (DDoS)/DoS attacks. A multi-feature approach combining principal component analysis (PCA) features and singular value decomposition (SVD) features is used to achieve higher performance.
Article
Computer Science, Information Systems
Fan Yang, Xiang Song
Summary: This paper addresses a security control issue of connected vehicle systems subject to denial-of-service attacks, proposing a novel dynamic event-triggered mechanism and an extended tracking error model. A co-design method of controllers and communication parameters is developed to enhance system performance, with simulation results confirming the effectiveness of the proposed methods.
Article
Computer Science, Theory & Methods
Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo
Summary: This paper focuses on mining attacks targeting the Proof of Work (PoW) consensus mechanism in blockchain-based systems, proposes a selfish mining-based denial of service (SDoS) attack, and demonstrates its threat compared to existing mining attacks.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2022)
Article
Computer Science, Information Systems
N. Nishanth, A. Mujeeb
Summary: Wireless ad hoc networks are crucial in disaster situations, but are vulnerable to various attacks due to lack of centralized management and secure boundaries. The algorithm proposed in the article, based on Bayesian inference, can effectively defend against flooding-based DoS attacks with high detection accuracy and extremely low false detection rate.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Information Systems
Sajjad Ahmad, Imran Raza, M. Hasan Jamal, Sirojiddin Djuraev, Soojung Hur, Imran Ashraf
Summary: Vehicle-to-grid technology allows unused power from Electric Vehicles (EVs) to be used by the smart grid through a central aggregator, but existing intrusion detection systems cannot be used in the vehicle-to-grid network due to its special requirements. This paper investigates the impact of denial-of-service attacks by malicious EVs on the central aggregator and proposes an intrusion detection system for the vehicle-to-grid network.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Chemistry, Analytical
Basheer Riskhan, Halawati Abd Jalil Safuan, Khalid Hussain, Asma Abbas Hassan Elnour, Abdelzahir Abdelmaboud, Fazlullah Khan, Mahwish Kundi
Summary: Cyberattacks in the modern world are becoming increasingly sophisticated, with DDoS attacks being the most common. Effective approaches, such as traffic shaping and pushback, have been proposed in the distributed setting to mitigate such attacks. This study introduces a heuristic-based technique called SYN Flood Attack Detection and Mitigation Technique (SFaDMT), which demonstrates improved detection of SYN attacks.
Article
Engineering, Civil
Ning Zhao, Xudong Zhao, Meng Chen, Guangdeng Zong, Huiyan Zhang
Summary: This paper presents a resilient distributed event-triggered security control strategy to resist Denial of Service (DoS) attacks on connected vehicles. A switched sampled-data scheme is proposed to ensure that the control signal acts immediately when the attack ends. A co-design approach for controller gains and triggering parameters is given. Simulation and experimental studies demonstrate the effectiveness of the proposed method.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Automation & Control Systems
Lucheng Sun, Ya Zhang, Changyin Sun
Summary: This article explores how an intelligent attacker disrupts consensus in leader-following multiagent systems through denial-of-service attacks, introduces an algorithm to generate minimum attacked edges, and provides upper and lower bounds on the attack probability to destroy consensus.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS
(2022)
Article
Computer Science, Information Systems
Amir Torabi, Jafar Zarei, Roozbeh Razavi-Far, Mehrdad Saif
Summary: This article discusses decentralized resilient observer-based output-feedback control design for networked control systems, considering network imperfections and security issues. Sufficient conditions are provided using linear matrix inequalities to guarantee the uniformly globally exponential stability of the NCS. The effectiveness and applicability of the proposed method are demonstrated through simulation results.
IEEE SYSTEMS JOURNAL
(2022)
Article
Automation & Control Systems
Yanping Yang
Summary: This paper addresses the problem of average cluster synchronization control of networked harmonic oscillators under denial-of-service (DoS) attacks. A novel switching cluster synchronization control scheme is proposed, which selects different control protocols based on the occurrence of DoS attacks. The control design criteria for both synchronous and asynchronous DoS attacks are established using a Lyapunov-Krasovskii functional method. An iterative algorithm is designed to calculate the control gain matrices. The effectiveness of the proposed control scheme is demonstrated through a multi-vehicle cooperative control system.
Article
Automation & Control Systems
Rui Zhao, Zhiqiang Zuo, Yijing Wang
Summary: This article studies the stabilization problem for switched systems in the presence of denial-of-service (DoS) attack using the event-triggered scheme. It proposes a novel multiple Lyapunov function to consider the joint effects of DoS attack and controller mode, and successfully achieves global exponential stabilization of the system. By calculating a lower bound of the event-triggered interval, the Zeno behavior is eliminated.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL
(2022)
Article
Computer Science, Information Systems
Mitali Sinha, Pramit Bhattacharyya, Sidhartha Sankar Rout, Neha Bhairavi Prakriya, Sujay Deb
Summary: The increasing use of third-party accelerators in modern SoCs can introduce vulnerabilities and lead to system attacks. To detect flooding attacks, we propose a two-step attack detection framework using machine learning, which achieves accurate detection with minimal performance impact.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Rajorshi Biswas, Jie Wu
Summary: This paper proposes a DDoS attack protection system using filter routers, which can minimize attack traffic and blockage of legitimate users by selecting appropriate filter router nodes.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Automation & Control Systems
Yaqi Wang, Jianquan Lu, Jinling Liang
Summary: This study aims to design a novel control protocol to enhance the security of multiagent systems against denial-of-service attacks, achieve system consensus through certain conditions, estimate the upper bounds of attack frequency and duration tolerated by the system, reduce computational complexity, and mitigate the impact of attackers on the controller.
IEEE TRANSACTIONS ON CYBERNETICS
(2022)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)