Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (8,454)

Search Parameters:
Keywords = network services

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
13 pages, 2191 KiB  
Article
A Deep-Learning-Based Method for Spectrum Sensing with Multiple Feature Combination
by Yixuan Zhang and Zhongqiang Luo
Electronics 2024, 13(14), 2705; https://doi.org/10.3390/electronics13142705 - 10 Jul 2024
Viewed by 121
Abstract
Cognitive radio networks enable the detection and opportunistic access to an idle spectrum through spectrum-sensing technologies, thus providing services to secondary users. However, at a low signal-to-noise ratio (SNR), existing spectrum-sensing methods, such as energy statistics and cyclostationary detection, tend to fail or [...] Read more.
Cognitive radio networks enable the detection and opportunistic access to an idle spectrum through spectrum-sensing technologies, thus providing services to secondary users. However, at a low signal-to-noise ratio (SNR), existing spectrum-sensing methods, such as energy statistics and cyclostationary detection, tend to fail or become overly complex, limiting their sensing accuracy in complex application scenarios. In recent years, the integration of deep learning with wireless communications has shown significant potential. Utilizing neural networks to learn the statistical characteristics of signals can effectively adapt to the changing communication environment. To enhance spectrum-sensing performance under low-SNR conditions, this paper proposes a deep-learning-based spectrum-sensing method that combines multiple signal features, including energy statistics, power spectrum, cyclostationarity, and I/Q components. The proposed method used these combined features to form a specific matrix, which was then efficiently learned and detected through the designed ‘SenseNet’ network. Experimental results showed that at an SNR of −20 dB, the SenseNet model achieved a 58.8% spectrum-sensing accuracy, which is a 3.3% improvement over the existing convolutional neural network model. Full article
Show Figures

Figure 1

23 pages, 5137 KiB  
Article
Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)
by Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet and Ben Sanders
Telecom 2024, 5(3), 609-631; https://doi.org/10.3390/telecom5030031 - 10 Jul 2024
Viewed by 173
Abstract
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific [...] Read more.
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices’ overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system’s performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user’s experience and trust level of such a system will be tested. Full article
Show Figures

Figure 1

19 pages, 2463 KiB  
Article
Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control
by Imran Khan, Qazi Ejaz Ali, Hassan Jalil Hadi, Naveed Ahmad, Gauhar Ali, Yue Cao and Mohammed Ali Alshara
Technologies 2024, 12(7), 110; https://doi.org/10.3390/technologies12070110 - 9 Jul 2024
Viewed by 310
Abstract
A supply chain (SC) encompasses a network of businesses, individuals, events, data, and resources orchestrating the movement of goods or services from suppliers to customers. Leveraging a blockchain-based platform, smart contracts play a pivotal role in aligning business logic and tracking progress within [...] Read more.
A supply chain (SC) encompasses a network of businesses, individuals, events, data, and resources orchestrating the movement of goods or services from suppliers to customers. Leveraging a blockchain-based platform, smart contracts play a pivotal role in aligning business logic and tracking progress within supply chain activities. Employing two distinct ledgers, namely Hyperledger and Ethereum, introduces challenges in handling the escalating volume of data and addressing the technical expertise gap related to supply chain management (SCM) tools in blockchain technology. Within the domain of blockchain-based SCM, the growing volume of data activities introduces challenges in the efficient regulation of data flow and the assurance of privacy. To tackle these challenges, a straightforward approach is recommended to manage data growth and thwart unauthorized entries or spam attempts within blockchain ledgers. The proposed technique focuses on validating hashes to ensure blockchain integrity. Emphasizing the authentication of sensitive data on the blockchain to bolster SCM, this approach compels applications to shoulder increased accountability. The suggested technique involves converting all data into textual format, implementing code encryption, and establishing permission-based access control. This strategy aims to address inherent weaknesses in blockchain within SCM. The results demonstrate the efficacy of the proposed technique in providing security and privacy for various types of data within SCM. Overall, the approach enhances the robustness of blockchain-based SCM, offering a comprehensive solution to navigate evolving challenges in data management and privacy assurance. Full article
15 pages, 4951 KiB  
Article
Research on a Vehicle-Mounted Emergency Communication System Using BeiDou Regional Short Message Communication (RSMC) for Firefighting Operations in Forest Areas without a Public Network
by Can Xu, Shufa Sun, Yuan Zhou and Zian Ding
Forests 2024, 15(7), 1185; https://doi.org/10.3390/f15071185 - 9 Jul 2024
Viewed by 186
Abstract
The low coverage of public networks in pristine forest areas prevents on-site firefighters from communicating directly with remote command centers during forest fires, reducing firefighting efficiency. In this study, we designed a vehicle-mounted emergency communication system Using BeiDou RSMC (Regional Short Message Communication) [...] Read more.
The low coverage of public networks in pristine forest areas prevents on-site firefighters from communicating directly with remote command centers during forest fires, reducing firefighting efficiency. In this study, we designed a vehicle-mounted emergency communication system Using BeiDou RSMC (Regional Short Message Communication) for firefighting operations in forest areas without a public network to establish a satellite communication network and Zigbee self-organizing network technology to establish a local self-organizing network. Beidou RSMC is a satellite communication service developed and operated independently by China, and its signals now cover the entire globe. The combination of these two components ensures emergency communication in the event of a fire in a forest area without public network coverage. The performance of the system was tested by simulating a fire, and it was able to establish a reliable communication link between the firefighters on the scene and the remote command center in the absence of a public network. The proposed system solves the emergency communication problem that arises when a fire occurs in a forest area without a public network, enabling the remote command center to monitor fire information and dispatch various resources in real time, thereby improving firefighting efficiency and reducing casualties. Full article
(This article belongs to the Special Issue Wildfire Monitoring and Risk Management in Forests)
Show Figures

Figure 1

14 pages, 5583 KiB  
Article
Cloud-Based Remote Real-Time Monitoring and Control System for Spring Fatigue Testing Machine
by Guoshuai Wang, Tonghui Xu, Decheng Wang, Peng Cheng, Chenxi Shao, Feng Feng and Peng Zhou
Machines 2024, 12(7), 462; https://doi.org/10.3390/machines12070462 - 9 Jul 2024
Viewed by 228
Abstract
In recent years, the utilization of cloud technology has witnessed a surge, particularly in the domains of industrial automation and intelligent scenarios. However, the prevailing spring fatigue testing machine is still in the traditional single-machine working mode. In this mode, there are many [...] Read more.
In recent years, the utilization of cloud technology has witnessed a surge, particularly in the domains of industrial automation and intelligent scenarios. However, the prevailing spring fatigue testing machine is still in the traditional single-machine working mode. In this mode, there are many problems such as low automation of testing equipment, poor experimental site environment, and the need for experimenters to be on duty for a long time. In order to solve the above problems, this paper builds a cloud-based remote monitoring and control system based on the high-temperature constant-force spring fatigue testing machine. The system is based on Browser/Server architecture, and clients can access it anytime and anywhere using a browser in a public network environment. The server is hosted on a public cloud platform and includes website service, data storage service, WebSocket real-time communication service, and remote video monitoring service. Clients can remotely monitor and control the testing machine in real time through the cloud. After experimental verification, the real-time monitoring and control messages delay is 11 ms, and the video monitoring delay is 291 ms, which can meet the actual needs of remote spring fatigue testing. This remote monitoring and control system improves the automation of the spring fatigue testing machine and improves the working environment of the experimenters. In addition, it can be applied to other reliability testing machines in the laboratory, and can further help build a workshop-level remote monitoring and control platform. Full article
(This article belongs to the Section Machines Testing and Maintenance)
Show Figures

Figure 1

23 pages, 9382 KiB  
Article
Operation Model Based on Artificial Neural Network and Economic Feasibility Assessment of an EV Fast Charging Hub
by José F. C. Castro, Augusto C. Venerando, Pedro A. C. Rosas, Rafael C. Neto, Leonardo R. Limongi, Fernando L. Xavier, Wesley M. Rhoden, Newmar Spader, Adriano P. Simões, Nicolau K. L. Dantas, Antônio V. M. L. Filho, Luiz C. P. Silva and Pérolla Rodrigues
Energies 2024, 17(13), 3354; https://doi.org/10.3390/en17133354 - 8 Jul 2024
Viewed by 317
Abstract
The energy transition towards a low-emission matrix has motivated efforts to reduce the use of fossil fuels in the transportation sector. The growth of the electric mobility market has been consistent in recent years. In Brazil, there has been an accelerated growth in [...] Read more.
The energy transition towards a low-emission matrix has motivated efforts to reduce the use of fossil fuels in the transportation sector. The growth of the electric mobility market has been consistent in recent years. In Brazil, there has been an accelerated growth in the sales rate of new electric (and hybrid) vehicles (EVs). Fiscal incentives provided by governments, along with the reduction in vehicle costs, are factors contributing to the exponential growth of the EV fleet—creating a favorable environment for the dissemination of new technologies and enabling the participation of players from sectors such as battery manufacturing and charging stations. Considering the international context, the E-Lounge R&D joint initiative aims to evaluate different strategies to economically enable the electric mobility market, exploring EV charging service sales by energy distribution utility companies in Brazil. This work describes the step-by-step development of an ideal model of a charging hub and discusses its operation based on a real deployment, as well as its associated technical and economic feasibility. Using EV charging data based on the E-Lounge’s operational behavior, an artificial neural network (ANN) is applied to forecast future energy consumption to each EV charging station. This paper also presents an economic analysis of the E-Lounge case study, which can contribute to proposals for electric vehicle charging ecosystems in the context of smart energy systems. Based on the operational results collected, as well as considering equipment usage projections, it is possible to make EV charging enterprises feasible, even when high investments in infrastructure and equipment (charging stations and battery storage systems) are necessary, since the net present value is positive and the payback period is 4 years. This work contributes by presenting real operational data from a charging hub, a projection model aimed at evaluating future operations, and a realistic economic evaluation model based on a case study implemented in São Paulo, Brazil. Full article
Show Figures

Figure 1

25 pages, 1271 KiB  
Review
Multiple Roles of Green Space in the Resilience, Sustainability and Equity of Aotearoa New Zealand’s Cities
by Paul Blaschke, Maibritt Pedersen Zari, Ralph Chapman, Edward Randal, Meredith Perry, Philippa Howden-Chapman and Elaine Gyde
Land 2024, 13(7), 1022; https://doi.org/10.3390/land13071022 - 8 Jul 2024
Viewed by 269
Abstract
Green space is needed in urban areas to increase resilience to climate change and other shocks, as well as for human health and wellbeing. Urban green space (UGS) is increasingly considered as green infrastructure and highly complementary to engineered urban infrastructure, such as [...] Read more.
Green space is needed in urban areas to increase resilience to climate change and other shocks, as well as for human health and wellbeing. Urban green space (UGS) is increasingly considered as green infrastructure and highly complementary to engineered urban infrastructure, such as water and transport networks. The needs for resilient, sustainable and equitable future wellbeing require strategic planning, designing and upgrading of UGS, especially in areas where it has been underprovided. We explore the implications of these needs for urban development through a detailed review of cited UGS analyses conducted on the larger cities in Aotearoa New Zealand (AoNZ). There are important differences in UGS availability (i.e., quantity), accessibility and quality within and between cities. Some of these differences stem from ad hoc patterns of development, as well as topography. They contribute to apparently growing inequities in the availability and accessibility of UGS. Broader health and wellbeing considerations, encompassing Indigenous and community values, should be at the heart of UGS design and decisionmaking. Most of AoNZ’s cities aim (at least to some extent) at densification and decarbonisation to accommodate a growing population without costly sprawl; however, to date, sprawl continues. Our findings indicate a clear need for the design and provision of high-quality, well-integrated UGS within and servicing areas of denser housing, which are typically areas in cities with a demonstrable UGS deficiency. Full article
15 pages, 582 KiB  
Article
Research on Energy Trading Mechanism Based on Individual Level Carbon Quota
by Di Wang, Daozhi Zhao, Fang Chen and Xin Tang
Sustainability 2024, 16(13), 5810; https://doi.org/10.3390/su16135810 - 8 Jul 2024
Viewed by 236
Abstract
High economic growth is accompanied by substantial consumption of fossil energy and significant negative externalities on the ecological environment. The global warming effect resulting from environmental pollution caused by energy has brought energy carbon emissions into the forefront of social attention. Establishing a [...] Read more.
High economic growth is accompanied by substantial consumption of fossil energy and significant negative externalities on the ecological environment. The global warming effect resulting from environmental pollution caused by energy has brought energy carbon emissions into the forefront of social attention. Establishing a carbon trading market is an essential measure to achieve the “double carbon” goal, with individual and household carbon emissions accounting for 70% of China’s total emissions. Constructing an individual-level carbon trading market will facilitate the efficient realization of this goal. However, addressing the challenge of handling vast amounts of data and network congestion in relation to frequent but small-scale individual carbon trading has become an urgent issue that needs to be resolved. In light of this, the present study designs a digital technology-based framework for the carbon market trading system and proposes an individual carbon asset price-based model for carbon market trading, aiming to establish a research framework for the carbon quota market. Furthermore, blockchain technology is employed as the underlying technology in the proposed carbon trading market model to cater to individual-level carbon trading services and achieve optimal matching between carbon quota suppliers, thereby enhancing profitability of the carbon trading platform. The numerical results obtained from the model demonstrate that in absence of government subsidy mechanisms, individual-level carbon trading can effectively reduce total consumer emissions. The present study successfully overcomes the carbon lock-in effect of consumer groups and achieves the generation and trading of individual carbon assets despite capital constraints. This study facilitates accumulation and trade of individual carbon resources, reduces overall consumer emissions, enhances environmental benefits at societal level, and provides a foundation for governmental decision-making. Full article
(This article belongs to the Special Issue Sustainable Supply Chain Management for Remanufacturing)
Show Figures

Figure 1

21 pages, 1227 KiB  
Article
Exploring the Spatial Correlation Network and Its Formation Mechanisms in Urban Land Use Performance: A Case Study of the Yangtze River Economic Belt
by Hongjia Fang, Ji Chai, Zhanqi Wang, Rou Zhang, Chao Huang and Meiling Luo
Land 2024, 13(7), 1019; https://doi.org/10.3390/land13071019 - 8 Jul 2024
Viewed by 203
Abstract
Urban land is the primary location for manufacturing and services, facilitating the expansion and interconnectedness of economic activities and factor flows to shape various urban land-use performances (ULUP). Exploring these spatial linkages of urban land-use performance can play a crucial role in fostering [...] Read more.
Urban land is the primary location for manufacturing and services, facilitating the expansion and interconnectedness of economic activities and factor flows to shape various urban land-use performances (ULUP). Exploring these spatial linkages of urban land-use performance can play a crucial role in fostering cohesive urban development. Taking 109 prefecture-level cities as research samples, this paper explores the characteristics and influencing factors of the spatial network associated with ULUP in the Yangtze River Economic Belt through modified gravity model, network analysis and QAP analysis. The analysis shows that ULUP has shown an N-shaped trend over the past two decades. It has formed a network of correlations, with Chongqing, Shanghai, and Wuhan emerging as central nodes. Notably, the correlation predominantly occurs between geographically adjacent cities, with weaker links between the Yangtze River Economic Belt’s upstream, midstream, and downstream regions. The network can be divided into four distinct types: main inflow plate, main outflow plate, agent plate, and bidirectional spillover plate. Geographic location is the most significant factor influencing network formation, followed by resource mismatch, economic development, and openness. The study provides theoretical guidance and empirical support for improving the utilisation of urban land and promoting coordinated development. Full article
16 pages, 7340 KiB  
Article
Software-Defined Virtual Private Network for SD-WAN
by Chunle Fu, Bailing Wang, Hongri Liu and Wei Wang
Electronics 2024, 13(13), 2674; https://doi.org/10.3390/electronics13132674 - 8 Jul 2024
Viewed by 272
Abstract
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network [...] Read more.
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architecture by proposing an overlay-based SD-WAN solution named Software-Defined Virtual Private Network (SD-VPN). An SDN-based auto-constructed VPN model and its evaluating metrics are put forward to automatically construct overlay WANs by node placement and service orchestration of SD-VPN. Therefore, a joint placement algorithm of VPN nodes and algorithms for overlay WAN service loading and offloading are proposed for SD-VPN controllers. Finally, a three-layer SD-VPN system is implemented and deployed in actual network environments. Simulation experiments and system tests are conducted to prove the high-efficiency controllability, real-time programmability, and auto-constructed deployability of the proposed SD-VPN. Performance trade-off between SD-VPN control channels and data channels is evaluated, and SD-VPN controllers are proven to be extensible for other VPN protocols and advanced services. Full article
Show Figures

Figure 1

21 pages, 2996 KiB  
Article
Location Privacy Protection in Edge Computing: Co-Design of Differential Privacy and Offloading Mode
by Guowei Zhang, Shengjian Zhang, Zhiyi Man, Chenlin Cui and Wenli Hu
Electronics 2024, 13(13), 2668; https://doi.org/10.3390/electronics13132668 - 7 Jul 2024
Viewed by 327
Abstract
Edge computing has emerged as an innovative paradigm that decentralizes computation to the network’s periphery, empowering edge servers to manage user-initiated complex tasks. This strategy alleviates the computational load on end-user devices and increases task processing efficiency. Nonetheless, the task offloading process can [...] Read more.
Edge computing has emerged as an innovative paradigm that decentralizes computation to the network’s periphery, empowering edge servers to manage user-initiated complex tasks. This strategy alleviates the computational load on end-user devices and increases task processing efficiency. Nonetheless, the task offloading process can introduce a critical vulnerability, as adversaries may infer a user’s location through an analysis of their offloading mode, thereby threatening the user’s location privacy. To counteract this vulnerability, this study introduces differential privacy as a protective mechanism to obscure the user’s offloading mode, thereby safeguarding their location information. This research specifically addresses the issue of location privacy leakage stemming from the correlation between a user’s location and their task offloading ratio. The proposed strategy is based on differential privacy. It aims to increase the efficiency of offloading services and the benefits of task offloading. At the same time, it ensures privacy protection. An innovative optimization technique for task offloading that maintains location privacy is presented. Utilizing this technique, users can make informed offloading decisions, dynamically adjusting the level of obfuscation in response to the state of the wireless channel and their privacy requirements. This study substantiates the feasibility and effectiveness of the proposed mechanism through rigorous theoretical analysis and extensive empirical testing. The numerical results demonstrate that the proposed strategy can achieve a balance between offloading privacy and processing overhead. Full article
Show Figures

Figure 1

19 pages, 9845 KiB  
Article
Delineation of Intermittent Rivers and Ephemeral Streams Using a Hybrid Method
by Ning Wang, Fang Chen, Bo Yu, Haiying Zhang, Huichen Zhao and Lei Wang
Remote Sens. 2024, 16(13), 2489; https://doi.org/10.3390/rs16132489 - 7 Jul 2024
Viewed by 450
Abstract
Intermittent rivers and ephemeral streams are crucial for the water cycle and ecosystem services, yet they are often neglected by managers and researchers, especially in headwater areas. This oversight has caused a lack of comprehensive basemaps for these vital river systems. In headwater [...] Read more.
Intermittent rivers and ephemeral streams are crucial for the water cycle and ecosystem services, yet they are often neglected by managers and researchers, especially in headwater areas. This oversight has caused a lack of comprehensive basemaps for these vital river systems. In headwater regions, water bodies are typically sparse and disconnected, with narrow and less distinct channels. Therefore, we propose a novel hybrid method that integrates topographic data and remote sensing imagery to delineate river networks. Our method reestablishes connectivity among sparsely distributed water bodies through topographic pairs, enhances less distinct channel features using the gamma function, and converts topographic and water indices data into a weighted graph to determine optimal channels with the A* algorithm. The topographic and water indices data are derived from the Multi-Error-Removed Improved-Terrain DEM (MERIT DEM) and an average composite of the Modified Normalized Difference Water Index (MNDWI), respectively. In the upper Lancang-Mekong River basin, our method outperformed five publicly available DEM datasets, achieving over 91% positional accuracy within a 30 m buffer. This hybrid method enhances positional accuracy and effectively connects sparse water bodies in headwater areas, offering promising applications for delineating intermittent rivers and ephemeral streams and providing baseline information for these river systems. Full article
Show Figures

Figure 1

33 pages, 13060 KiB  
Article
Efficient SFC Protection Method against Network Attack Risks in Air Traffic Information Networks
by Yong Yang, Buhong Wang, Jiwei Tian and Peng Luo
Electronics 2024, 13(13), 2664; https://doi.org/10.3390/electronics13132664 - 7 Jul 2024
Viewed by 257
Abstract
With the continuous development of the civil aviation industry toward digitalization and intelligence, the closed architecture of traditional air traffic information networks struggles to meet the rapidly growing demands for air traffic services. Network function virtualization (NFV) is one of the key technologies [...] Read more.
With the continuous development of the civil aviation industry toward digitalization and intelligence, the closed architecture of traditional air traffic information networks struggles to meet the rapidly growing demands for air traffic services. Network function virtualization (NFV) is one of the key technologies that can address the rigidity of traditional air traffic information networks. NFV technology has facilitated the flexible deployment of air traffic services, but it has also expanded the attack surface of the network. In addressing the network attack risks faced by service function chains (SFCs) in NFV environments, a SFC protection method based on honeypots and backup technology (PBHB) is proposed to reduce the resource cost of protecting air traffic information networks while enhancing network security. Initially, PBHB utilizes the TAPD algorithm to deploy the primary VNFs as closely as possible to the shortest path between the source and destination endpoints, thus aiming to reduce SFC latency and save bandwidth resource costs. Subsequently, the RAHDR algorithm is employed to install honeypot VNFs in each physical platform that is at risk of side-channel attacks, thus updating the deployment status of honeypot VNFs in real time based on the VNF lifecycle in order to offer primary protection for SFCs. Lastly, the BDMPE algorithm was used to calculate the backup scheme with the highest protection efficiency to implement secondary protection for the SFCs that still do not meet the security requirements. Through experiments, the maximum backup limit for SFCs in PBHB was determined, confirming its satisfactory performance across various SFC arrival rates. Furthermore, performance comparisons with other SFC protection methods revealed that PBHB achieves optimizations in resources cost while ensuring SFC security and latency. Full article
(This article belongs to the Special Issue 5G Technology for Internet of Things)
Show Figures

Figure 1

26 pages, 378 KiB  
Article
Social Inclusion of Gen Z Ukrainian Refugees in Lithuania: The Role of Online Social Networks
by Isabel Palomo-Domínguez, Jolanta Pivorienė and Odeta Merfeldaitė
Soc. Sci. 2024, 13(7), 361; https://doi.org/10.3390/socsci13070361 - 5 Jul 2024
Viewed by 312
Abstract
Since the start of the war in Ukraine, Lithuania, a country of barely 3 million inhabitants, has welcomed more than 85,000 refugees, mainly minors and young people. This research focuses on the youth segment, members of Gen Z, which exhibits a marked gender [...] Read more.
Since the start of the war in Ukraine, Lithuania, a country of barely 3 million inhabitants, has welcomed more than 85,000 refugees, mainly minors and young people. This research focuses on the youth segment, members of Gen Z, which exhibits a marked gender bias, as the majority are women. The purpose of this study is to determine the role played by online social networks in the process of social inclusion in the host community. Methodologically, this research conducts a qualitative approach through in-depth interviews with open code content analysis. The results point to changes in their behavior as social media users, such as using new online social networks, and greater attention to practical topics such as knowing necessary services and leisure opportunities in their new environment. Among the conclusions, the positive effect of online social networks in the social inclusion process of these young refugees stands out: being members of the local virtual community facilitates new social interactions in the physical world of the host country. Full article
19 pages, 3465 KiB  
Article
Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks
by Zeeshan Ashraf, Adnan Sohail and Muddesar Iqbal
Electronics 2024, 13(13), 2649; https://doi.org/10.3390/electronics13132649 - 5 Jul 2024
Viewed by 539
Abstract
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, [...] Read more.
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, NFV reduces equipment costs. Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased. The communication links between people and people or from one machine to another machine are insecure. Usually, critical data are exchanged over the IoE, so authentication and confidentiality are significant concerns. Asymmetric key cryptosystems increase computation and communication overheads. This paper proposes a lightweight and certificateless end-to-end secure communication scheme to provide security services against replay attacks, man-in-the-middle (MITM) attacks, and impersonation attacks with low computation and communication overheads. The system is implemented on Linux-based Lubuntu 20.04 virtual machines using Java programming connected to NFV-based large-scale hybrid IPv4-IPv6 virtual networks. Finally, we compare the performance of our proposed security scheme with existing schemes based on the computation and communication costs. In addition, we measure and analyze the performance of our proposed secure communication scheme over NFV-based virtualized networks with regard to several parameters like end-to-end delay and packet loss. The results of our comparison with existing security schemes show that our proposed security scheme reduces the computation cost by 38.87% and the communication cost by 26.08%. Full article
(This article belongs to the Special Issue Cyber-Physical Systems in Industrial IoT)
Show Figures

Figure 1

Back to TopTop