IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks.
Latest Published Articles
-
Advance system and model to predict malicious files prorogation inside computer network
Sun Jan 20 00:00:00 EST 2019 Sun Jan 20 00:00:00 EST 2019 -
Monetization of IoT data using smart contracts
Sun Jan 20 00:00:00 EST 2019 Sun Jan 20 00:00:00 EST 2019 -
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems
Sun Jan 20 00:00:00 EST 2019 Sun Jan 20 00:00:00 EST 2019 -
Agent-based ARP cache poisoning detection in switched LAN environments
Sun Jan 20 00:00:00 EST 2019 Sun Jan 20 00:00:00 EST 2019 -
Wireless digital traffic signs of the future
Sun Jan 20 00:00:00 EST 2019 Sun Jan 20 00:00:00 EST 2019
Popular Articles
-
Theoretical modelling of fog computing: a green computing paradigm to support IoT applications
Thu Mar 24 00:00:00 EDT 2016 Thu Mar 24 00:00:00 EDT 2016 -
Evolution of ransomware
Thu Aug 23 00:00:00 EDT 2018 Thu Aug 23 00:00:00 EDT 2018 -
IoT technologies for smart cities
Thu Dec 21 00:00:00 EST 2017 Thu Dec 21 00:00:00 EST 2017 -
Monetization of IoT data using smart contracts
Sun Jan 20 00:00:00 EST 2019 Sun Jan 20 00:00:00 EST 2019 -
Trends on virtualisation with software defined networking and network function virtualisation
Lorena Isabel Barona LΓ³pez ; Γngel Leonardo Valdivieso Caraguay ; Luis Javier GarcΓa Villalba ; Diego LΓ³pezMon Sep 21 00:00:00 EDT 2015 Mon Sep 21 00:00:00 EDT 2015
Publish in this Journal
Meet Our Editors
Editor-in-Chief
Han-Chieh Chao
National Ilan University
Popular Documents (January 2019)
Feed
-
Theoretical modelling of fog computing: a green computing paradigm to support IoT applications
Publication Year: 2016, Page(s):23 - 29
Cited by: Papers (27)In this study, the authors focus on theoretical modelling of the <i>fog computing</i> architecture and compare its performance with the traditional cloud computing model. Existing research works on fog computing have primarily focused on the principles and concepts of fog computing and its significance in the context of <i>internet of things</i> (<i>IoT</i>). Th... View full abstract»
-
Evolution of ransomware
Publication Year: 2018, Page(s):321 - 327
Cited by: Papers (2)Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extortion. This study contributes to the authors' knowledge by exploring the transition from the early-day scams, to extortion implemented by current ransomw... View full abstract»
-
IoT technologies for smart cities
Publication Year: 2018, Page(s):1 - 13
Cited by: Papers (6)The large deployment of Internet of things (IoT) is actually enabling smart city projects and initiatives all over the world. Objects used in daily life are being equipped with electronic devices and protocol suites in order to make them interconnected and connected to the Internet. According to a recent Gartner study, 50 billion connected objects will be deployed in smart cities by 2020. These co... View full abstract»
-
Monetization of IoT data using smart contracts
Publication Year: 2019, Page(s):32 - 37In the era of the Internet of Things (IoT), smart connected devices have the ability to generate data that could be of interest to the public. This paves the way for an emerging market for monetized data exchanges, where IoT device owners can sell access to live data generated by their connected devices to interested users. Implementing a trusted, cost-efficient, automatic monetization solution of... View full abstract»
-
Trends on virtualisation with software defined networking and network function virtualisation
Lorena Isabel Barona LΓ³pez ; Γngel Leonardo Valdivieso Caraguay ; Luis Javier GarcΓa Villalba ; Diego LΓ³pezPublication Year: 2015, Page(s):255 - 263
Cited by: Papers (5)Software defined networking (SDN) and network function virtualisation (NFV) have become hot topics in recent years. On one hand, SDN decouples the control plane from the data plane allowing the rapid innovation and the introduction of new services in an easy way. On the other hand, currently proprietary appliances such as load balancers and firewalls are implemented in hardware, NFV aims to change... View full abstract»
-
Privacy and data security for grid-connected home area network using Internet of Things
Publication Year: 2018, Page(s):445 - 452Sensors with IoT assistance provides secured communication and data integrity inside HAN. Energy reading and information flow from the smart grid, together with sensors, bring about a new perspective on energy management. This paper primarily investigates the secured data flow in HAN and assures data privacy of customers during critical and emergency operations. Data are made available in real tim... View full abstract»
-
Machine learning-based IDS for software-defined 5G network
Publication Year: 2018, Page(s):53 - 60
Cited by: Papers (4)As an inevitable trend of future fifth generation (5G) networks, software-defined architecture has many advantages in providing centralised control and flexible resource management. However, it is also confronted with various security challenges and potential threats with emerging services and technologies. As the focus of network security, intrusion detection systems (IDSs) are usually deployed s... View full abstract»
-
Wireless digital traffic signs of the future
Publication Year: 2019, Page(s):74 - 78Traffic signs have come a long way since the first automobile was invented. They have long served the purpose of warning and guiding drivers and also enforcing the traffic laws governing speed, parking, turns, and stopping. In this study, the authors discuss the issues and challenges facing current traffic signs, and how it will evolve into a next-generation traffic sign architecture using advance... View full abstract»
-
COLIDE: a collaborative intrusion detection framework for Internet of Things
Junaid Arshad ; Muhammad Ajmal Azad ; Mohammad Mahmoud Abdellatif ; Muhammad Habib Ur Rehman ; Khaled SalahPublication Year: 2019, Page(s):3 - 14Internet of Things (IoT) represent a network of resource-constrained sensor devices connected through the open Internet, susceptible to misuse by intruders. Traditional standalone intrusion detection systems (IDS) are tasked with monitoring device behaviours to identify malicious activities. These systems not only require extensive network and system resources but also cause delays in detecting a ... View full abstract»
-
Cognitive radio-enabled Internet of Vehicles: a cooperative spectrum sensing and allocation for vehicular communication
Publication Year: 2018, Page(s):190 - 199
Cited by: Papers (2)Internet of Things (IoTs) era is expected to empower all aspects of Intelligent Transportation System (ITS) to improve transport safety and reduce road accidents. US Federal Communication Commission (FCC) officially allocated 75 MHz spectrum in the 5.9 GHz band to support vehicular communication. The authors studied the application of cognitive radio (CR) technology to IoVs to increase the spectra... View full abstract»
-
Security in device-to-device communications: a survey
Publication Year: 2018, Page(s):14 - 22
Cited by: Papers (2)Device-to-device (D2D) communication is a promising technology for the next generation mobile communication networks (5G). Indeed, it is expected to allow high throughput, reduce communication delays and reduce energy consumption and traffic load. D2D technology will enhance the capacity and the performance of traditional cellular networks. Security issues must be considered in all types of commun... View full abstract»
-
Smart mobility management in 5G heterogeneous networks
Publication Year: 2018, Page(s):119 - 128Mobility management has always been a challenging and important issue for the next-generation all-IP mobile networks. Seamless mobility is one of the requirements to provide real-time services in such networks. Proxy Mobile IPv6 (PMIPv6) has been developed by the Internet Engineering Task Force (IETF) as a network-based mobility management protocol to support the mobility of IP devices. Although s... View full abstract»
-
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems
Publication Year: 2019, Page(s):48 - 58In a typical healthcare monitoring system, the cloud is the preferred platform to aggregate, store and analyse data collected from Medical Internet of Things (or MIoT) devices. However, remote cloud servers and storage can be a source of substantial delay. To overcome such delays, an intermediate layer of fog or edge nodes is used for localised processing and storage of MIoT data. To this end, an ... View full abstract»
-
Energy efficiency of small cell backhaul networks based on GaussβMarkov mobile models
Publication Year: 2015, Page(s):158 - 167
Cited by: Papers (39)To satisfy the recent growth of mobile data usage, small cells are recommended to deploy into conventional cellular networks. However, the massive backhaul traffic is a troublesome problem for small cell networks, especial in wireless backhaul transmission links. In this study, backhaul traffic models are first presented considering the Gauss-Markov mobile models of mobile stations in small cell n... View full abstract»
-
Packet collision analysis when heterogeneous unlicensed IoT technologies coexist
Publication Year: 2018, Page(s):384 - 392This study deals with the impact of unlicensed Internet of Things (IoT) network coexistence in terms of packet collision. The classical packet collision studies based on the Poisson distributed process generally assume homogeneous networks with packets of equal lengths. The authors propose a new approach which can be applied to a more general context including heterogeneous networks and different ... View full abstract»
-
Agent-based ARP cache poisoning detection in switched LAN environments
Publication Year: 2019, Page(s):67 - 73Address resolution protocol (ARP) cache poisoning is mostly used to perform man-in-the-middle (MITM) and denial of service (DoS) attacks for sniffing and network services disruption, respectively, in switch LAN networks. The former attack affects the privacy of a network user, whereas the latter attack causes huge damage to networks in terms of unavailability of services. There are many security s... View full abstract»
-
Cellular automata malware propagation model for WSN based on multi-player evolutionary game
Publication Year: 2018, Page(s):129 - 135When wireless sensor network (WSN) is running, it needs data acquisition, fusion, and transmission, which makes the attacker distribute the malware code to the network to destroy the normal operation of the network. In this study, an improved two-dimensional (2D) cellular automata model and a multi-player evolutionary game model are proposed to describe the propagation process of malware propagati... View full abstract»
-
Advance system and model to predict malicious files prorogation inside computer network
Publication Year: 2019, Page(s):38 - 47A new model for malicious file propagation and transmission in a computer network is formulated. This model introduced a cure rate ΞΎ (E-cure rate) which is calculated after the regular running of anti-virus in the systems of the computer network. This will result in monitoring the anti-virus efficiency in fighting not only a local malicious file but also the global spreading of such a file.... View full abstract»
-
Optimising the power using firework-based evolutionary algorithms for emerging IoT applications
Publication Year: 2019, Page(s):15 - 31Optimising the overall power in a cluster-assisted internet of things (IoT) network is a challenging problem for emerging IoT applications. In this study, the authors propose a mathematical model for the cluster-assisted IoT network. The cluster-assisted IoT network consists of three types of nodes: IoT nodes, core cluster nodes (CCNs) and base stations (BSs). The objective is to minimise transmis... View full abstract»
-
Secured cloud computing for medical data based on watermarking and encryption
Publication Year: 2018, Page(s):294 - 298In this study, the authors propose a hardware implementation of a local cloud for storing, sharing and archiving patient's folders (health report and medical imaging) based on raspberry Pi card and a local cloud (hard disc) while exchanging with other distant public cloud (google drive, azure cloud, ...). Securing the medical data is ensured by a proposed encrypting method for the watermarked digi... View full abstract»
-
Relaying protocols for buffer-aided energy harvesting wireless cooperative networks
Publication Year: 2018, Page(s):109 - 118
Cited by: Papers (1)Here, the authors study a buffer-aided relay system, in which the source node and the relay node are energy harvesting nodes, and the source node transmits the information to the destination node via the relay node. Both the source node and relay node are assumed to equipped with an energy buffer and can temporarily store the harvested energy; in addition, the relay node possesses a data buffer to... View full abstract»
-
Restricted Boltzmann machine-based cognitive protocol for secure routing in software defined wireless networks
Publication Year: 2017, Page(s):162 - 168Secure and stable routing is a critical issue in a conventional network environment, as the control and data planes are integrated. An intelligent routing is highly essential to provide an attack free network to its intended users. The programmable software defined network is an emerging network paradigm in which the security policies and the forwarding rules are implemented in the controller via ... View full abstract»
-
Improved clustering algorithm based on energy consumption in wireless sensor networks
Publication Year: 2017, Page(s):47 - 53
Cited by: Papers (3)Wireless sensor networks (WSNs) are widely used in military, traffic, medical and so on. The design of routing protocol for WSNs is limited by the single nature of the local topology information. Meanwhile, the power supply of sensor networks node, communication ability and storage capacity are limited, so how to improve the efficient energy of nodes and extend the networks life cycle is the focus... View full abstract»
-
Balanced and energy-efficient multi-hop techniques for routing in wireless sensor networks
Publication Year: 2018, Page(s):33 - 43
Cited by: Papers (1)In Wireless Sensor Networks, the power resources of the nodes are significantly restricted. Hence, a special treatment for their available energy is deeply required. In long distance transmission, Multi-Hop (MH) techniques are preferred. Although MH minimizes the amount of energy cost consumed by each node along the path but finding the optimal routing path between nodes is still very interesting ... View full abstract»
-
Trust management for reliable decision making among social objects in the Social Internet of Things
Publication Year: 2017, Page(s):75 - 80
Cited by: Papers (2)The Internet is populated with billions of electronic gadgets that have become a part of our fabric. Internet of Things is gaining popularity in at most all applications from smart buildings, intelligent transportation, healthcare and defence. IoT is a many vision one paradigm technology. One of the many visions of IoT is to make `Things' social. Social Internet of Things (SIoT) is a young paradig... View full abstract»
Aims & Scope
IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks.
Meet Our Editors
Editor-in-Chief
Han-Chieh Chao
National Ilan University
Further Links
Aims & Scope
IET Networks covers the fundamental developments and advancing methodologies to achieve higher performance, optimized and dependable future networks. IET Networks is particularly interested in new ideas and superior solutions to the known and arising technological development bottlenecks at all levels of networking such as topologies, protocols, routing, relaying and resource-allocation for more efficient and more reliable provision of network services.
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=6072580 More »
Frequency: 1
ISSN: 2047-4954
Subjects
- Communication, Networking & Broadcasting
Editor-in-Chief
Han-Chieh Chao
National Ilan University
Taiwan
About this Journal
Contacts
Editor-in-Chief
Han-Chieh Chao
National Ilan University