Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00-7:30 AM ET (10:00-12:30 UTC).
We apologize for the inconvenience.
By Topic

IEEE Network

Issue 6 • November-December 2016

Filter Results

Displaying Results 1 - 22 of 22
  • Front Cover

    Publication Year: 2016, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (2154 KB)
    Freely Available from IEEE
  • Cover 2

    Publication Year: 2016, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (713 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Mobile Social Networks: Prospects and Challenges

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Guest Editorial: Network Forensics and Surveillance for Emerging Networks

    Publication Year: 2016, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (396 KB)
    Freely Available from IEEE
  • Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges

    Publication Year: 2016, Page(s):6 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB)

    The separation of the control plane from the data plane of a switch enables abstraction of a network through a logically centralized controller. The controller functions as the “brain” of a software-defined network. However, centralized control draws attackers to exploit different network devices by hijacking the controller. Security was initially not a key characteristic of SDN archit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall

    Publication Year: 2016, Page(s):14 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB)

    Currently, different forms of ransomware are increasingly threatening Internet users. Modern ransomware encrypts important user data, and it is only possible to recover it once a ransom has been paid. In this article we show how software-defined networking can be utilized to improve ransomware mitigation. In more detail, we analyze the behavior of popular ransomware — CryptoWall — and,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 2016, Page(s): 21
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Suspicious Flow Forwarding for Multiple Intrusion Detection Systems on Software-Defined Networks

    Publication Year: 2016, Page(s):22 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    In recent years, there have been an increasing number of attacks on networks, such as the distributed denial-of-service attack. However, the traditional network is not sufficiently flexible to control the huge amount of traffic that now passes through an intrusion detection system. With SDN, which separates control planes and data planes for programmability, elasticity, and simplicity, it becomes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Denial of Service Attacks in Software Defined Networks

    Publication Year: 2016, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB)

    Software defined networking greatly simplifies network management by decoupling control functions from the network data plane. However, such a decoupling also opens SDN to various denial of service attacks: an adversary can easily exhaust network resources by flooding short-lived spoofed flows. Toward this issue, we present a comprehensive study of DoS attacks in SDN, and propose multi-layer fair ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices

    Publication Year: 2016, Page(s):34 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Personal devices contain electronic evidence associated with the behavior of their owners and other devices in their environment, which can help clarify the facts of a cyber-crime scene. These devices are usually analyzed as containers of proof. However, it is possible to harness the boom of personal devices to define the concept of digital witnesses, where personal devices are able to actively ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording

    Publication Year: 2016, Page(s):42 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB)

    Packet recording or capturing is one of the most useful tools for network forensics and surveillance. Since a storage system is of a limited size, de-duplication can be used to save disk space. In this article, we present a new scalable de-duplication engine for packet recording that can eliminate redundant contents over multiple packets. Unlike previous work, our proposed scheme is designed for p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attack Detection and Distributed Forensics in Machine-to-Machine Networks

    Publication Year: 2016, Page(s):49 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Jammer Placement for Physical Layer Security Enhancement

    Publication Year: 2016, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Wireless networks are increasingly being employed to transfer highly sensitive information. Due to the broadcast nature of wireless channels, security issues have been taken as a critical role in wireless communications. A promising direction toward achieving secure wireless communications is physical-layer security, which is an approach exploiting the randomness of wireless channels to ensure sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Cognitive Radio Networks against Primary User Emulation Attacks

    Publication Year: 2016, Page(s):62 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB)

    Cognitive radio is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security is a very important but not well addressed issue in CR networks. In this article we focus on security problems arising from primary user emulation (PUE) attacks in CR... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability and Criticality Analysis of Communication Networks by Stochastic Computation

    Publication Year: 2016, Page(s):70 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    Reliability is an important feature in the design and maintenance of a large-scale network. In this article, the reliability of information transmission between a transmitter and a receiver (i.e., a two-terminal network) is considered as a generalized connectivity framework of terminal nodes. As network complexity increases, existing approaches to reliability analysis are encountering significant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying VLC in 5G Networks: Architectures and Key Technologies

    Publication Year: 2016, Page(s):77 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB)

    Visible light communication has gained tremendous attention recently and has become a favorable complementary technology to millimeter- wave communication in short-range communication scenarios for future 5G networks. VLC possesses a number of prominent features to address the highly demanding 5G system requirements for high capacity, high data rate, high spectral efficiency, high energy efficienc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Anything as a Service" for 5G Mobile Systems

    Publication Year: 2016, Page(s):84 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (965 KB)

    5G network architecture and its functions are yet to be defined. However, it is generally agreed that cloud computing, network function virtualization (NFV), and software defined networking (SDN) will be key enabling technologies for 5G. Indeed, putting all these technologies together ensures several advantages in terms of network configuration flexibility, scalability, and elasticity, which are h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavior Dynamics of Multiple Crowdsourcers in Mobile Crowdsourcing Markets

    Publication Year: 2016, Page(s):92 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (204 KB)

    Mobile crowdsourcing has shown great potential to address problems with large scale by outsourcing tasks to pervasive smartphone users. Smartphone users will join a crowdsourcer if they can receive satisfying rewards. In a mobile crowdsourcing market, smartphone users have free choice of crowdsourcers, and multiple crowdsourcers will interact with the rest of the market to share the limited smartp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cover 3

    Publication Year: 2016, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (1096 KB)
    Freely Available from IEEE
  • Cover 4

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1478 KB)
    Freely Available from IEEE

Aims & Scope

As currently defined, IEEE Network covers the following areas: 1. network protocols and architectures, 2. Protocol design and validation, 3. Communication software and its development and test, 4. Network control and signalling, 5. network management, 6. Practical network implementations including local area networks, (LANs), metropolitan area networks (MANs), and wide  area networks, (WANs), 7. Switching and processing in integrated (voice/data) networks and network components, 8. Micro-to-host communication.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief

Nei Kato
Tohoku University, Japan
kato@it.is.tohoku.ac.jp