当前期刊: IEEE NETWORK Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Front Cover
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Presents the front cover for this issue of the publication.

    更新日期:2020-06-02
  • Cover 2
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Advertisement.

    更新日期:2020-06-02
  • Table of Contents
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Presents the table of contents for this issue of the publication.

    更新日期:2020-06-02
  • Comsoc Membership
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Advertisement.

    更新日期:2020-06-02
  • Scanning the Literature
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Xiaohua Tian

    Presents concise summaries of selected papers that are recently published in the field of networking. Each summary describes the paper's main idea, methodology, and technical contributions. The purpose of the column is to bring the state of the art of networking research to readers of IEEE Network. Authors are also welcome to recommend their recently published work to the column, and papers with novel

    更新日期:2020-06-02
  • Cyber Security Based on Artificial Intelligence for Cyber-Physical Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Hichem Sedjelmaci; Fateh Guenab; Sidi-Mohammed Senouci; Hassnaa Moustafa; Jiajia Liu; Shuai Han

    The ten papers in this special issue focus on cybersecurity for cyber-physical systems (CPSs). The systems have become very complex, more sophisticated, intelligent and autonomous. They offer very complex interaction between heterogeneous cyber and physical components; additionally to this complexity, they are exposed to important disturbances due to unintentional and intentional events which make

    更新日期:2020-06-02
  • BLCS: Brain-Like Distributed Control Security in Cyber Physical Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Hui Yang; Kaixuan Zhan; Michel Kadoch; Yongshen Liang; Mohamed Cheriet

    The cyber-physical system (CPS) has operated, controlled, and coordinated the physical systems integrated by a computing and communication core applied in Industry 4.0. To accommodate CPS services, fog radio and optical networks (F-RON) has become an important supporting physical cyber infrastructure taking advantage of both the inherent ubiquity of wireless technology and the large capacity of optical

    更新日期:2020-06-02
  • An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Tian Wang; Yuzhu Liang; Yi Yang; Guangquan Xu; Hao Peng; Anfeng Liu; Weijia Jia

    Cyber-physical systems (CPSs) have become more complex, more sophisticated, and more intelligent. In addition to this complexity, they have also been exposed to some important disturbances due to unintentional and intentional events since the number of cyber attacks has increased, and their behaviors have become more sophisticated. The openness, virtualization, and ubiquitous access traits of the combination

    更新日期:2020-06-02
  • Comsoc Conferences
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Advertisement.

    更新日期:2020-06-02
  • Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    He Fang; Angie Qi; Xianbin Wang

    Security provisioning has become the most important design consideration for large-scale Internet of Things (IoT) systems due to their critical roles in supporting diverse vertical applications by connecting heterogenous devices, machines, and industry processes. Conventional authentication and authorization schemes are insufficient to overcome the emerging IoT security challenges due to their reliance

    更新日期:2020-06-02
  • Toward Integrated Virtual Emotion System with AI Applicability for Secure CPS-Enabled Smart Cities: AI-Based Research Challenges and Security Issues
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Hyunbum Kim; Jalel Ben-Othman

    Cyber-physical systems (CPS) basically pursue a new form of integrated interaction with humans through computation and physical capabilities covering complex, intelligent, autonomous systems. Also, artificial intelligence (AI) is considered as a promising technology that will be applicable to numerous combined next generation applications including CPS, security, and communication in smart cities.

    更新日期:2020-06-02
  • Learning-Assisted Secure End-to-End Network Slicing for Cyber-Physical Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Qiang Liu; Tao Han; Nirwan Ansari

    There is a pressing need to interconnect physical systems such as power grid and vehicles for efficient management and safe operations. Due to the diverse features of physical systems, there is hardly a one-size-fits-all networking solution for developing cyber-physical systems. Network slicing is a promising technology that allows network operators to create multiple virtual networks on top of a shared

    更新日期:2020-06-02
  • Machine-Learning-Based Side-Channel Leakage Detection in Electronic System-Level Synthesis
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Lu Zhang; Dejun Mu; Wei Hu; Yu Tai

    Security critical hardware devices in CPS must experience security testing including side-channel leakage detection, which aims to provide earlier assessment before coming into service. Due to the exponential nature of ESLS, performing fast and efficient leakage detection is a critical task in the context of security evaluation for DSE. However, the traditional method of leakage detection is always

    更新日期:2020-06-02
  • Federated Learning for Data Privacy Preservation in Vehicular Cyber-Physical Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Yunlong Lu; Xiaohong Huang; Yueyue Dai; Sabita Maharjan; Yan Zhang

    Recent developments in technologies such as MEC and AI contribute significantly in accelerating the deployment of VCPS. Techniques such as dynamic content caching, efficient resource allocation, and data sharing play a crucial role in enhancing the service quality and user driving experience. Meanwhile, data leakage in VCPS can lead to physical consequences such as endangering passenger safety and

    更新日期:2020-06-02
  • Reinforcement Learning Empowered IDPS for Vehicular Networks in Edge Computing
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Muzhou Xiong; Yuepeng Li; Lin Gu; Shengli Pan; Deze Zeng; Peng Li

    As VANETs have been widely applied in various fields including entertainment and safety- related applications like autonomous driving, malicious intrusions into VANETs may lead to disastrous results. Hence, intrusion detection accuracy as well as efficiency is sensitive to the normal operation of VANETs. Regarding this, in this article we propose an architecture of IDPS for VANETs. One of the highlights

    更新日期:2020-06-02
  • Artificial-Intelligence-Based Distributed Belief Propagation and Recurrent Neural Network Algorithm for Wide-Area Monitoring Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Sriramya Bhamidipati; Kyeong Jin Kim; Hongbo Sun; Philip V. Orlik

    To monitor the power grid over a wide area, the wide area monitoring systems (WAMSs) has been developed. At each substation, the Global Positioning System (GPS) receiving system resides to provide trusted timing. Thus, it is critical for the WAMS to maintain authentic GPS timing over a wide area. However, GPS timing is susceptible to spoofing due to the unencrypted signal structure and its low signal

    更新日期:2020-06-02
  • Pseudonym Limitation for Privacy in Cooperative Transport Systems
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Hacene Fouchal; Safia Boudra; Secil Ercan; Itheri Yahiaoui

    C-ITS is one of the most challenging domains in either research or industry. Their social and economic benefits are of importance for fuel consumption, traffic management, and road safety. Consequently, they have been deployed in many countries. Privacy is a critical feature of any shared system. This issue is crucial for deployed C-ITS in order to avoid tracking drivers who send continuous messages

    更新日期:2020-06-02
  • User Preference Aware Resource Management for Wireless Communication Networks
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Ailing Xiao; Xiaofu Huang; Sheng Wu; Chunxiao Jiang; Li Ma; Zhu Han

    With the development of next-generation communication technologies and smart handheld devices, mobile services have multiplied the global network traffic. Due to the subjectivity of user expectations and the instability of wireless environments, the Quality of Experience (QoE) of the mobile service is not always satisfactory. Recently, many optimization schemes have been proposed to evaluate and improve

    更新日期:2020-06-02
  • Ultra-Reliable and Low-Latency Communications for Connected Vehicles: Challenges and Solutions
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Haojun Yang; Kan Zheng; Kuan Zhang; Jie Mei; Yi Qian

    With the rapid development of communications and computing, the concept of connected vehicles emerges to improve driving safety, traffic efficiency and the infotainment experience. Due to the limited capabilities of sensors and information processing on a single vehicle, vehicular networks (VNETs) play a vital role for the realization of connected vehicles. To achieve closer cooperation on the road

    更新日期:2020-06-02
  • Energy-Efficient Monitoring of Fire Scenes for Intelligent Networks
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Khan Muhammad; Joel J. P. C. Rodrigues; Sergey Kozlov; Francesco Piccialli; Victor Hugo C. de Albuquerque

    In the current surveillance networks, a vast amount of data is generated from different sources, resulting in big data. Such data need intelligent technologies and big data analytics for its realtime analysis to provide different services. This article describes an efficient artificial intelligence and big data analytics-assisted system for real-time fire scene analysis in surveillance networks. The

    更新日期:2020-06-02
  • Service-Less Video Multicast in 5G: Enablers and Challenges
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02
    Kamran Zahoor; Kashif Bilal; Aiman Erbad; Amr Mohamed

    The massive upsurge in production and demand of crowdsourced live streaming necessitates feasible and cost effective solutions in future cellular networks. Video multicast is one of the viable options to deliver live video using standardized multicast technologies, such as evolved Multimedia Broadcast Multicast Services (eMBMS) architecture. However, eMBMS being a service-oriented architecture, it

    更新日期:2020-06-02
  • Cover 3
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Advertisement.

    更新日期:2020-06-02
  • Cover 4
    IEEE Netw. (IF 8.808) Pub Date : 2020-06-02

    Advertisement.

    更新日期:2020-06-02
  • Toward Assured Data Deletion in Cloud Storage
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-30
    Dong Zheng; Liang Xue; Chao Yu; Yannan Li; Yong Yu

    Outsourcing data to remote cloud servers can significantly reduce the managing overhead and storage burden for individuals and enterprises. When the data stored in cloud are no longer needed, assured data deletion is a fundamental requirement to ensure that the sensitive data on the cloud can be safely deleted. Salient features of cloud storage such as virtualization, multi-tenancy, high availability

    更新日期:2020-04-30
  • Front Cover
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02

    Presents the front cover for this issue of the publication.

    更新日期:2020-04-22
  • Cover 2
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02

    Advertisement.

    更新日期:2020-04-22
  • Table of Contents
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02

    Presents the table of contents for this issue of the publication.

    更新日期:2020-04-22
  • WFIOT
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02

    Advertisement.

    更新日期:2020-04-22
  • Recent Advances in Security and Privacy for Future Intelligent Networks
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Xiaojiang Du; Meng Shen; Zheng Chang; Zhao Cao

    The articles in this special section focus on recent advances in security and privacy for future intelligent networks. Recent booming advancements in networking techniques have led to an evolution toward future intelligent networks (FINs). This trend takes place under a circumstance in which a great number of devices are connected for specific purposes by a variety of novel techniques. In FINs, we

    更新日期:2020-04-22
  • Achieving a Covert Channel over an Open Blockchain Network
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Feng Gao; Liehuang Zhu; Keke Gai; Can Zhang; Sheng Liu

    Blockchain technology is an immutable database that cannot be censored, tampered with, or erased, which can increase credibility and reduce interaction costs. Therefore, blockchain technology is expected to become the next generation Internet infrastructure, with broad application prospects in many industries, such as medicine, energy, and finance. The open network and publicly stored data in a blockchain

    更新日期:2020-04-22
  • Data Security and Privacy Challenges of Computing Offloading in FINs
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Fei Wang; Boyu Diao; Tao Sun; Yongjun Xu

    Recently, a variety of novel techniques (e.g. Internet-of-Things, cloud computing, edge/fog computing, big data, intelligence accelerating chip) make a great number of different devices connected for specific purposes. Based on the significant features of techniques, networking technologies have evolved into future intelligent networks (FINs), in which intelligence has been integrated into networks

    更新日期:2020-04-22
  • Comsoc Conferences
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02

    Advertisement.

    更新日期:2020-04-22
  • A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Guangquan Xu; Wenjuan Zhou; Arun Kumar Sangaiah; Yao Zhang; Xi Zheng; Qiang Tang; Naixue Xiong; Kaitai Liang; Xiaokang Zhou

    The pervasive communications between vehicles and dynamic mobility may significantly increase data exchange and therefore bring a huge amount of traffic data in InVANETs. Due to some environmental factors, like the vulnerability of wireless connection, limitation of in-car computing ability, and speed of vehicles, it is extremely challenging to design identity authentication protocols satisfying the

    更新日期:2020-04-22
  • Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Bo Wu; Ke Xu; Qi Li; Shoushou Ren; Zhuotao Liu; Zhichao Zhang

    Collaborative edge computing (CEC) is a novel extension for several edge paradigms (e.g., mobile edge computing, fog computing, and cloudlet) to further enhance processing capabilities to support computation-intensive and latency-sensitive applications in edge-centric networks. While existing schemes keep adding new functionalities (e.g., collaborative computing and caching), they overlook an important

    更新日期:2020-04-22
  • Security and Privacy Challenges in 5G-Enabled Vehicular Networks
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Chengzhe Lai; Rongxing Lu; Dong Zheng; Xuemin Sherman Shen

    Recently, many academic institutions and standardization organizations have conducted research on vehicular communications based on LTE or 5G. As the most important standardization organization of cellular systems, the 3rd Generation Partnership Project (3GPP) has been developing the standard supporting vehicle-to-everything (V2X) services based on LTE, and has already prepared the roadmap toward 5G-based

    更新日期:2020-04-22
  • Blockchain-Based Privacy-Aware Content Caching in Cognitive Internet of Vehicles
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Yongfeng Qian; Yingying Jiang; Long Hu; M. Shamim Hossain; Mubarak Alrashoud; Muneer Al-Hammadi

    The Cognitive Internet of Vehicles (CIoV) introduces a cognitive engine in the traditional Internet of Vehicles, which can realize more intelligent functions such as vehicle deployment and resource allocation. Especially in terms of content caching, the cognitive engine can perceive the content requirements of users and match the content providers and content requesters to improve the caching hit rate

    更新日期:2020-04-22
  • Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Zhihong Tian; Yuhang Wang; Yanbin Sun; Jing Qiu

    LPPMs have been well surveyed based on the view of methodologies, attacks, and so on. It has long been ignored that LBS applicability will be sacrificed due to the implementation of LPPMs. Existing and future LPPMs should clearly claim LBS applicability. This is essential for future research on location privacy in the MEC environment because of the diversity development of the LBS. To realize this

    更新日期:2020-04-22
  • Waving Gesture Analysis for User Authentication in the Mobile Environment
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Chao Shen; Zhao Wang; Chengxiang Si; Yufei Chen; Xiaojie Su

    The increasing popularity of wearable devices has brought great convenience to human life and business. As wearable devices have become widely used personal computing platforms, more and more private information gets accessed by them, which stresses an urgent need for feasible and reliable authentication mechanisms in the current mobile computing environment. However, traditional memory- based authentication

    更新日期:2020-04-22
  • Toward Secure Storage in Cloud-based eHealth Systems: A Blockchain-Assisted Approach
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Sheng Cao; Xiaosong Zhang; Rixin Xu

    Cloud-based eHealth systems enable patients and medical institutions to manage their EHRs in a flexible and efficient way. Since EHRs are the most sensitive data for people and have significant value to adversaries, outsourced EHRs suffer from both internal and external threats. In this article, we first identify the threats toward the security of outsourced EHRs and present system and security criteria

    更新日期:2020-04-22
  • Comsoc Training
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02

    Advertisement.

    更新日期:2020-04-22
  • Mobility Enabled Security for Optimizing IoT based Intelligent Applications
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Sandeep Pirbhulal; Wanqing Wu; Khan Muhammad; Irfan Mehmood; Guanglin Li; Victor Hugo C. de Albuquerque

    The critical challenges for IoT-based intelligent applications for the adaptive environment are effective resource allocation, secure data transmission, and mobility management. It is highly significant that these mandatory requirements be considered in the overall IoT-enabled smart networks. In this research, we initially propose the resource allocation model for IoT-based systems by adopting the

    更新日期:2020-04-22
  • Fog Intelligence for Network Anomaly Detection
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Kai Yang; Hui Ma; Shaoyu Dou

    Anomalies are common in network system monitoring. When manifested as network threats to be mitigated, service outages to be prevented, and security risks to be ameliorated, detecting such anomalous network behaviors becomes of great importance. However, the growing scale and complexity of the mobile communication networks, as well as the ever-increasing amount and dimensionality of network surveillance

    更新日期:2020-04-22
  • BlockSDN: Blockchain-as-a-Service for Software Defined Networking in Smart City Applications
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Gagangeet Singh Aujla; Maninderpal Singh; Arnab Bose; Neeraj Kumar; Guangjie Han; Rajkumar Buyya

    Smart cities have emerged as a hub of intelligent applications (e.g., intelligent transportation systems, smart parking, smart homes, and e-healthcare) to provide ambient-assisted living and quality of experience to wide communities of users. The smooth execution of these applications depends on reliable data transmission between various smart devices and machines. However, the exponential increase

    更新日期:2020-04-22
  • Fast Service Migration in 5G Trends and Scenarios
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Rami Akrem Addad; Diego Leonel Cadette Dutra; Miloud Bagaa; Tarik Taleb; Hannu Flinck

    The need for faster and higher-capacity networks that can sustain modern, high-demanding applications has driven the development of 5G technology. Moreover, support for low-latency communication (1ms -10ms) is one of the main requirements of 5G systems. Multi-access Edge Computing (MEC) has been seen as a key component to attain the 5G objectives, since it allows hosting and executing critical services

    更新日期:2020-04-22
  • Toward Slicing-Enabled Multi-Access Edge Computing in 5G
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Adlen Ksentini; Pantelis A. Frangoudis

    Multi-access Edge Computing (MEC) and Network Slicing are two key enablers for 5G, particularly to empower low-latency services, known as Ultra-Reliable Low Latency Communications (URLLC). However, MEC and Network Slicing are evolving in parallel, and are being defined by two different standardization bodies, ETSI and 3GPP, which limits their integration and their benefits as complementary solutions

    更新日期:2020-04-22
  • Computational Learning Approaches for Personalized Pregnancy Care
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Mario W. L. Moreira; Joel J. P. C. Rodrigues; Kashif Saleem; Valery V. Korotaev

    The increasing use of interconnected sensors to monitor patients with chronic diseases, integrated with tools for the management of shared information, can guarantee a better performance of health information systems (HISs) by performing personalized healthcare. The early diagnosis of chronic diseases such as hypertensive disorders of pregnancy represents a significant challenge in women’s healthcare

    更新日期:2020-04-22
  • Smartphone Identification via Passive Traffic Fingerprinting: A Sequence-to-Sequence Learning Approach
    IEEE Netw. (IF 8.808) Pub Date : 2020-02-19
    Francesca Meneghello; Michele Rossi; Nicola Bui

    Passive cyber-security attacks do not require any modification of the data stream generated by the victim, nor the creation of a false statement; in particular, those attacks based on statistical analysis aim at acquiring sensible information by just analyzing traffic patterns. Our work sits on the conjecture that the PDCCH, which is transmitted in clear text, may be effectively used to statistically

    更新日期:2020-04-22
  • Integration of Communication, Positioning, Navigation and Timing for Deep-Sea Vehicles
    IEEE Netw. (IF 8.808) Pub Date : 2020-04-02
    Tongwei Zhang; Guangjie Han; Chuan Lin; Nadra Guizani; Haibing Li; Lei Shu

    High-quality CPNT is a key technology for deep-sea vehicles that dive into the deep sea and for detecting and developing the deep sea. At present, however, CPNT services for deep-sea vehicles are provided by separate communication, positioning, and navigation systems as well as separate synchronous clocks (atomic clocks). This directly affects the operational efficiency, for example, update rates of

    更新日期:2020-04-22
  • Toward Intelligent Task Offloading at the Edge
    IEEE Netw. (IF 8.808) Pub Date : 2019-10-28
    Hongzhi Guo; Jiajia Liu; Jianfeng Lv

    With the booming development of IoT and massive smart MDs springing up in daily life, the conflict between resource-hungry IoT applications and resource-constrained MDs becomes increasingly prominent. To cope with compute-intensive applications and big data, MCC combining AI was adopted as a workable solution. Nevertheless, considering MCC’s long transmission latency and the ultra-low latency requirements

    更新日期:2020-04-22
  • The Road beyond 5G: A Vision and Insight of the Key Technologies
    IEEE Netw. (IF 8.808) Pub Date : 2020-02-19
    Konstantinos Samdanis; Tarik Taleb

    As 5G enters a stable phase in terms of system architecture, 3GPP Release 17 starts to investigate advanced features that would shape the evolution toward 6G. This paper provides an insightful analysis for mobile networks Beyond 5G (B5G) considering the advancements and implications introduced by the evolution of softwarization, agile control and deterministic services. It elaborates the 5G landscape

    更新日期:2020-04-22
  • Structured Bayesian Compression for Deep Models in Mobile-Enabled Devices for Connected Healthcare
    IEEE Netw. (IF 8.808) Pub Date : 2019-09-04
    Sijia Chen; Bin Song; Xiaojiang Du; Nadra Guizani

    Deep models, typically deep neural networks, have millions of parameters, analyze medical data accurately, yet in a time-consuming method. However, energy cost effectiveness and computational efficiency are important for prerequisites developing and deploying mobile-enabled devices, the mainstream trend in connected healthcare. Therefore, deep models’ compression has become a problem of great significance

    更新日期:2020-04-22
  • Side-Channel Analysis for Intelligent and Connected Vehicle Security: A New Perspective
    IEEE Netw. (IF 8.808) Pub Date : 2019-09-16
    Yijie Xun; Jiajia Liu; Yanning Zhang

    With the continuous expansion and deepening of ICVs, advanced technologies continue to emerge, making ICVs more intelligent to serve and protect drivers. Although the development of ICVs has brought great convenience and better driving experiences for users, at the same time it also brings many intrusion portals for malicious attackers. There are many hostile invaders who only focus on how to achieve

    更新日期:2020-04-22
  • Resource Allocation for Optimizing Energy Efficiency in NOMA-based Fog UAV Wireless Networks
    IEEE Netw. (IF 8.808) Pub Date : 2019-09-16
    Yabo Li; Haijun Zhang; Keping Long; Sunghyun Choi; Arumugam Nallanathan

    Due to their advantages in rapid deployment and miniaturization, UAVs have been widely used in various fields, especially for disaster scenarios which require emergency communications. This article considers a fog UAV wireless network and focuses on improving energy efficiency through subchannel assignment and power allocation. Specifically, in order to make better use of limited spectrum resources

    更新日期:2020-04-22
  • SleepGuardian: An RF-Based Healthcare System Guarding Your Sleep from Afar
    IEEE Netw. (IF 8.808) Pub Date : 2020-02-19
    Yu Gu; Yantong Wang; Zhi Liu; Jun Liu; Jie Li

    The ever accelerating process of urbanization urges more and more population into the swelling cities. While city residents are enjoying an entertaining life supported by advanced informatics techniques like 5G and cloud computing, the same technologies have also gradually deprived their sleep, which is crucial for their wellness. Therefore, sleep monitoring has drawn significant attention from both

    更新日期:2020-04-22
  • Secure V2X Communication Network based on Intelligent PKI and Edge Computing
    IEEE Netw. (IF 8.808) Pub Date : 2019-09-04
    Han Qiu; Meikang Qiu; Ruqian Lu

    The current remarkable development of communication technology is enabling the intelligent driving system by providing a V2X network to exchange and process transportation data. However, security, as a fundamental requirement, is still lacking in many aspects of current V2X networks. For V2X networks, low latency, as a critical requirement for V2X networks, restrains usage of traditional security functions

    更新日期:2020-04-22
  • Application of Time-Varying Graph Theory over the Space Information Networks
    IEEE Netw. (IF 8.808) Pub Date : 2020-02-19
    Tao Zhang; Jiandong Li; Hongyan Li; Shun Zhang; Peng Wang; Haiying Shen

    SIN is constructed to support real-time data acquisition, massive data transmission and processing, and systematized information services. Different from static networks, both the network topologies and the available network resources are dynamic in SIN. However, the existing networking technologies treat SIN as segmented static networks, and ignore the relationship among different segmented subnetworks

    更新日期:2020-04-22
  • AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions
    IEEE Netw. (IF 8.808) Pub Date : 2020-02-12
    Chafika Benzaid; Tarik Taleb

    The foreseen complexity in operating and managing 5G and beyond networks has propelled the trend toward closed-loop automation of network and service management operations. To this end, the ETSI Zero-touch network and Service Management (ZSM) framework is envisaged as a next-generation management system that aims to have all operational processes and tasks executed automatically, ideally with 100 percent

    更新日期:2020-04-22
  • Probe Delay Based Adaptive Port Scanning for IoT Devices with Private IP Address Behind NAT
    IEEE Netw. (IF 8.808) Pub Date : 2019-10-15
    Fengxiao Tang; Yuichi Kawamoto; Nei Kato; Kazuto Yano; Yoshinori Suzuki

    Recently, the explosive increase in the number of IoT devices makes the IoT becomes extremely large-scaled, and the security of such a large scale IoT emerges as a big challenge. As a classic security technique, the port scan is widely used around the world. However, as IP resources are limited, a large number of devices are located in the LAN or WLAN behind the NAT which cannot be directly accessed

    更新日期:2020-04-22
  • Unleashing the Power of Participatory IoT with Blockchains for Increased Safety and Situation Awareness of Smart Cities
    IEEE Netw. (IF 8.808) Pub Date : 2019-10-28
    Bechir Hamdaoui; Mohamed Alkalbani; Taieb Znati; Ammar Rayes

    IoT has emerged as an unprecedented paradigm with great potential for changing how people interact, think and live. It is making existing Internet services feasible in ways that were previously impossible, as well as paving the way for new situation- awareness applications suitable for smart cities, such as realtime video surveillance, traffic control, and emergency management. These applications will

    更新日期:2020-04-22
  • Directional Modulation: A Physical-Layer Security Solution to B5G and Future Wireless Networks
    IEEE Netw. (IF 8.808) Pub Date : 2019-09-16
    Feng Shu; Tong Shen; Ling Xu; Yaolu Qin; Siming Wan; Shi Jin; Xiaohu You; Jiangzhou Wang

    Directional modulation (DM), as an efficient secure transmission method, offers security through its directive property and is suitability for LoP channels such as millimeter wave, UAV, satellite communication, and smart transportation. If the direction angle of the desired user is known, the desired channel gain vector is obtainable. Thus, in advance, the DM transmitter knows the values of the directional

    更新日期:2020-04-22
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
胸部和胸部成像专题
自然科研论文编辑服务
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
鲁照永
华东师范大学
苏州大学
南京工业大学
南开大学
中科大
唐勇
跟Nature、Science文章学绘图
隐藏1h前已浏览文章
中洪博元
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
x-mol收录
广东实验室
南京大学
王杰
南科大
刘尊峰
湖南大学
清华大学
王小野
中山大学化学工程与技术学院
试剂库存
天合科研
down
wechat
bug