Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,043)

Search Parameters:
Keywords = software-defined networking

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2535 KiB  
Article
A Game Model and Fault Recovery Algorithm for SDN Multi-Domain
by Tao Xu, Chen Chen, Kaiming Hu and Yi Zhuang
Sensors 2025, 25(1), 164; https://doi.org/10.3390/s25010164 - 30 Dec 2024
Viewed by 412
Abstract
Software-defined networking (SDN) offers an effective solution for flexible management of Wireless Sensor Networks (WSNs) by separating control logic from sensor nodes. This paper tackles the challenge of timely recovery from SDN controller failures and proposes a game theoretic model for multi-domain controllers. [...] Read more.
Software-defined networking (SDN) offers an effective solution for flexible management of Wireless Sensor Networks (WSNs) by separating control logic from sensor nodes. This paper tackles the challenge of timely recovery from SDN controller failures and proposes a game theoretic model for multi-domain controllers. A game-enhanced autonomous fault recovery algorithm for SDN controllers is proposed, which boasts fast fault recovery and low migration costs. Taking into account the remaining capacity of controllers and the transition relationships between devices, the target controller is first selected to establish a controller game domain. The issue of mapping the out-of-control switches within the controller game domain to the target controller is transformed into a linear programming problem for solution. A multi-population particle swarm optimization algorithm with repulsive interaction is employed to iteratively evolve the optimal mapping between controllers and switches. Finally, migration tasks are executed based on the optimal mapping results, and the role transition of the target controller is completed. Comparative experimental results demonstrate that, compared to existing SDN controller fault recovery algorithms, the proposed algorithm can balance the migration cost of switches and the load pressure on controllers while reducing propagation delay in SDN controllers, significantly decreasing the fault recovery time. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 1580 KiB  
Article
Predictive Forwarding Rule Caching for Latency Reduction in Dynamic SDN
by Doosik Um, Hyung-Seok Park, Hyunho Ryu and Kyung-Joon Park
Sensors 2025, 25(1), 155; https://doi.org/10.3390/s25010155 - 30 Dec 2024
Viewed by 360
Abstract
In mission-critical environments such as industrial and military settings, the use of unmanned vehicles is on the rise. These scenarios typically involve a ground control system (GCS) and nodes such as unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs). The GCS and [...] Read more.
In mission-critical environments such as industrial and military settings, the use of unmanned vehicles is on the rise. These scenarios typically involve a ground control system (GCS) and nodes such as unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs). The GCS and nodes exchange different types of information, including control data that direct unmanned vehicle movements and sensor data that capture real-world environmental conditions. The GCS and nodes communicate wirelessly, leading to loss or delays in control and sensor data. Minimizing these issues is crucial to ensure nodes operate as intended over wireless links. In dynamic networks, distributed path calculation methods lead to increased network traffic, as each node independently exchanges control messages to discover new routes. This heightened traffic results in internal interference, causing communication delays and data loss. In contrast, software-defined networking (SDN) offers a centralized approach by calculating paths for all nodes from a single point, reducing network traffic. However, shifting from a distributed to a centralized approach with SDN does not inherently guarantee faster route creation. The speed of generating new routes remains independent of whether the approach is centralized, so SDN does not always lead to faster results. Therefore, a key challenge remains: determining how to create new routes as quickly as possible even within an SDN framework. This paper introduces a caching technique for forwarding rules based on predicted link states in SDN, which was named the CRIMSON (Cashing Routing Information in Mobile SDN Network) algorithm. The CRIMSON algorithm detects network link state changes caused by node mobility and caches new forwarding rules based on predicted topology changes. We validated that the CRIMSON algorithm consistently reduces end-to-end latency by an average of 88.96% and 59.49% compared to conventional reactive and proactive modes, respectively. Full article
Show Figures

Figure 1

29 pages, 2090 KiB  
Review
SDN-Based Integrated Satellite Terrestrial Cyber–Physical Networks with 5G Resilience Infrastructure: Future Trends and Challenges
by Oluwatobiloba Alade Ayofe, Kennedy Chinedu Okafor, Omowunmi Mary Longe, Christopher Akinyemi Alabi, Abdoulie Momodu Sunkary Tekanyi, Aliyu Danjuma Usman, Mu’azu Jibrin Musa, Zanna Mohammed Abdullahi, Ezekiel Ehime Agbon, Agburu Ogah Adikpe, Kelvin Anoh, Bamidele Adebisi, Agbotiname Lucky Imoize and Hajara Idris
Technologies 2024, 12(12), 263; https://doi.org/10.3390/technologies12120263 - 16 Dec 2024
Viewed by 1020
Abstract
This paper reviews the state-of-the art technologies and techniques for integrating satellite and terrestrial networks within a 5G and Beyond Networks (5GBYNs). It highlights key limitations in existing architectures, particularly in addressing interoperability, resilience, and Quality of Service (QoS) for real-time applications. In [...] Read more.
This paper reviews the state-of-the art technologies and techniques for integrating satellite and terrestrial networks within a 5G and Beyond Networks (5GBYNs). It highlights key limitations in existing architectures, particularly in addressing interoperability, resilience, and Quality of Service (QoS) for real-time applications. In response, this work proposes a novel Software-Defined Networking (SDN)-based framework for reliable satellite–terrestrial integration. The proposed framework leverages intelligent traffic steering and dynamic access network selection to optimise real-time communications. By addressing gaps in the literature with a distributed SDN control approach spanning terrestrial and space domains, the framework enhances resilience against disruptions, such as natural disasters, while maintaining low latency and jitter. Future research directions are outlined to refine the design and explore its application in 6G systems. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

18 pages, 2723 KiB  
Article
An Efficient Multi-Topology Construction Method for Scheduling Mobile Data Flows in Software-Defined Networking
by Chi Zhang, Haojiang Deng and Rui Han
Appl. Sci. 2024, 14(24), 11568; https://doi.org/10.3390/app142411568 - 11 Dec 2024
Viewed by 441
Abstract
In mobile networks, a content server can provide multiple services simultaneously to a mobile device, generating multiple data flows. As the device moves, the transmission path in the wired network may need to be switched to maintain service continuity. However, a single switching [...] Read more.
In mobile networks, a content server can provide multiple services simultaneously to a mobile device, generating multiple data flows. As the device moves, the transmission path in the wired network may need to be switched to maintain service continuity. However, a single switching path may not be able to accommodate all the flows, potentially leading to congestion and a degraded user experience. To address this challenge, we propose a multi-topology routing-based mobile data scheduling method that dynamically switches flows across multiple paths to enhance flexibility and load balancing. The performance of this method is significantly influenced by the construction of logical topologies. Well-designed topologies provide high-bandwidth, low-latency paths to all possible destination nodes, while poorly designed topologies waste switch capacity and fail to achieve these goals. In this paper, we introduce an efficient multi-topology construction method for scheduling mobile data flows in software-defined networking (SDN). Our approach optimizes and balances transmission capacity for each destination node while adhering to the flow entry constraints of switches. Simulations demonstrate that our method consistently outperforms the single-path switching method and the other two multi-topology construction methods in terms of packet delay, packet loss rate, and network throughput, regardless of the device’s new location. Full article
Show Figures

Figure 1

15 pages, 647 KiB  
Article
Anchor-Based Method for Inter-Domain Mobility Management in Software-Defined Networking
by Akichy Adon Jean Rodrigue Kanda, Amanvon Ferdinand Atta, Zacrada Françoise Odile Trey, Michel Babri and Ahmed Dooguy Kora
Algorithms 2024, 17(12), 566; https://doi.org/10.3390/a17120566 - 11 Dec 2024
Viewed by 480
Abstract
Recently, there has been an explosive growth in wireless devices capable of connecting to the Internet and utilizing various services anytime, anywhere, often while on the move. In the realm of the Internet, such devices are called mobile nodes. When these devices are [...] Read more.
Recently, there has been an explosive growth in wireless devices capable of connecting to the Internet and utilizing various services anytime, anywhere, often while on the move. In the realm of the Internet, such devices are called mobile nodes. When these devices are in motion or traverse different domains while communicating, effective mobility management becomes essential to ensure the continuity of their services. Software-defined networking (SDN), a new paradigm in networking, offers numerous possibilities for addressing the challenges of mobility management. By decoupling the control and data planes, SDN enables greater flexibility and adaptability, making them a powerful framework for solving mobility-related issues. However, communication can still be momentarily disrupted due to frequent changes in IP addresses, a drop in radio signals, or configuration issues associated with gateways. Therefore, this paper introduces Routage Inter-domains in SDN (RI-SDN), a novel anchor-based routing method designed for inter-domain mobility in SDN architectures. The method identifies a suitable anchor domain, a critical intermediary domain that contributes to reducing delays during data transfer because it is the closest domain (i.e., node) to the destination. Once the anchor domain is identified, the best routing path is determined as the route with the smallest metric, incorporating elements such as bandwidth, flow operations, and the number of domain hops. Simulation results demonstrate significant improvements in data transfer delay and handover latency compared to existing methods. By leveraging SDN’s potential, RI-SDN presents a robust and innovative solution for real-world scenarios requiring reliable mobility management. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

28 pages, 1185 KiB  
Review
Integrating Blockchains with the IoT: A Review of Architectures and Marine Use Cases
by Andreas Polyvios Delladetsimas, Stamatis Papangelou, Elias Iosif and George Giaglis
Computers 2024, 13(12), 329; https://doi.org/10.3390/computers13120329 - 6 Dec 2024
Viewed by 709
Abstract
This review examines the integration of blockchain technology with the IoT in the Marine Internet of Things (MIoT) and Internet of Underwater Things (IoUT), with applications in areas such as oceanographic monitoring and naval defense. These environments present distinct challenges, including a limited [...] Read more.
This review examines the integration of blockchain technology with the IoT in the Marine Internet of Things (MIoT) and Internet of Underwater Things (IoUT), with applications in areas such as oceanographic monitoring and naval defense. These environments present distinct challenges, including a limited communication bandwidth, energy constraints, and secure data handling needs. Enhancing BIoT systems requires a strategic selection of computing paradigms, such as edge and fog computing, and lightweight nodes to reduce latency and improve data processing in resource-limited settings. While a blockchain can improve data integrity and security, it can also introduce complexities, including interoperability issues, high energy consumption, standardization challenges, and costly transitions from legacy systems. The solutions reviewed here include lightweight consensus mechanisms to reduce computational demands. They also utilize established platforms, such as Ethereum and Hyperledger, or custom blockchains designed to meet marine-specific requirements. Additional approaches incorporate technologies such as fog and edge layers, software-defined networking (SDN), the InterPlanetary File System (IPFS) for decentralized storage, and AI-enhanced security measures, all adapted to each application’s needs. Future research will need to prioritize scalability, energy efficiency, and interoperability for effective BIoT deployment. Full article
(This article belongs to the Special Issue When Blockchain Meets IoT: Challenges and Potentials)
Show Figures

Figure 1

22 pages, 7085 KiB  
Article
Multiple PUE Attack Detection in Cooperative Mobile Cognitive Radio Networks
by Ernesto Cadena Muñoz, Gustavo Chica Pedraza and Alexander Aponte Moreno
Future Internet 2024, 16(12), 456; https://doi.org/10.3390/fi16120456 - 4 Dec 2024
Viewed by 415
Abstract
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the [...] Read more.
The Mobile Cognitive Radio Network (MCRN) are an alternative to spectrum scarcity. However, like any network, it comes with security issues to analyze. One of the attacks to analyze is the Primary User Emulation (PUE) attack, which leads the system to give the attacker the service as a legitimate user and use the Primary Users’ (PUs) spectrum resources. This problem has been addressed from perspectives like arrival time, position detection, cooperative scenarios, and artificial intelligence techniques (AI). Nevertheless, it has been studied with one PUE attack at once. This paper implements a countermeasure that can be applied when several attacks simultaneously exist in a cooperative network. A deep neural network (DNN) is used with other techniques to determine the PUE’s existence and communicate it with other devices in the cooperative MCRN. An algorithm to detect and share detection information is applied, and the results show that the system can detect multiple PUE attacks with coordination between the secondary users (SUs). Scenarios are implemented on software-defined radio (SDR) with a cognitive protocol to protect the PU. The probability of detection (PD) is measured for some signal-to-noise ratio (SNR) values in the presence of one PUE or more in the network, which shows high detection values above 90% for an SNR of -7dB. A database is also created with the attackers’ data and shared with all the SUs. Full article
(This article belongs to the Special Issue AI and Security in 5G Cooperative Cognitive Radio Networks)
Show Figures

Figure 1

24 pages, 2771 KiB  
Article
Redundant Path Optimization in Smart Ship Software-Defined Networking and Time-Sensitive Networking Networks: An Improved Double-Dueling-Deep-Q-Networks-Based Approach
by Yanli Xu, Songtao He, Zirui Zhou and Jingxin Xu
J. Mar. Sci. Eng. 2024, 12(12), 2214; https://doi.org/10.3390/jmse12122214 - 2 Dec 2024
Viewed by 684
Abstract
Traditional network architectures in smart ship communication systems struggle to efficiently manage the integration of heterogeneous sensor data. Additionally, conventional end-to-end transmission algorithms that rely on single-metric and single-path selection are inadequate in fulfilling the high reliability and real-time transmission requirements essential for [...] Read more.
Traditional network architectures in smart ship communication systems struggle to efficiently manage the integration of heterogeneous sensor data. Additionally, conventional end-to-end transmission algorithms that rely on single-metric and single-path selection are inadequate in fulfilling the high reliability and real-time transmission requirements essential for high-priority service data. This inadequacy results in increased latency and packet loss for critical control information. To address these challenges, this study proposes an innovative ship network framework that synergistically integrates Software-Defined Networking (SDN) and Time-Sensitive Networking (TSN) technologies. Central to this framework is the introduction of a redundant multipath selection algorithm, which leverages Double Dueling Deep Q-Networks (D3QNs) in conjunction with Graph Convolutional Networks (GCNs). Initially, an optimization function encompassing transmission latency, bandwidth utilization, and packet loss rate is formulated within a software-defined time-sensitive network transmission framework tailored for smart ships. The proposed D3QN-GCN-based algorithm effectively identifies optimal working and redundant paths for TSN switches. These dual-path configurations are then disseminated by the SDN controller to the TSN switches, enabling the TSN’s inherent reliability redundancy mechanisms to facilitate the simultaneous transmission of critical service flows across multiple paths. Experimental evaluations demonstrate that the proposed algorithm exhibits robust convergence characteristics and significantly outperforms existing algorithms in terms of reducing network latency and packet loss rates. Furthermore, the algorithm enhances bandwidth utilization and promotes balanced network load distribution. This research offers a novel and effective solution for shipboard switch path selection, thereby advancing the reliability and efficiency of smart ship communication systems. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

25 pages, 7600 KiB  
Article
Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs, Alessandro Raschella, Michael Mackay, Max Hashem Eiza and Frank den Hartog
Future Internet 2024, 16(12), 442; https://doi.org/10.3390/fi16120442 - 28 Nov 2024
Viewed by 687
Abstract
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this [...] Read more.
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this paper, we explain that the 5G radio access schemes as used today cannot support such densities. This issue will have to be solved by 6G. However, this requires a fundamentally different approach to accessing the wireless medium compared to current generation networks: they are not designed to support many thousands of devices in each other’s vicinity, attempting to send/receive data simultaneously. In this paper, we present a 6G system architecture for trading wireless network resources in massive IoT scenarios, inspired by the concept of the sharing economy, and using the novel concept of spectrum programming. We simulated a truly massive IoT network and evaluated the scalability of the system when managed using our proposed 6G platform, compared to standard 5G deployments. The experiments showed how the proposed scheme can improve network resource allocation by up to 80%. This is accompanied by similarly significant improvements in interference and device energy consumption. Finally, we performed evaluations that demonstrate that the proposed platform can benefit all the stakeholders that decide to join the scheme. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies—Volume II)
Show Figures

Figure 1

17 pages, 2744 KiB  
Article
Priority/Demand-Based Resource Management with Intelligent O-RAN for Energy-Aware Industrial Internet of Things
by Seyha Ros, Seungwoo Kang, Inseok Song, Geonho Cha, Prohim Tam and Seokhoon Kim
Processes 2024, 12(12), 2674; https://doi.org/10.3390/pr12122674 - 27 Nov 2024
Viewed by 563
Abstract
The last decade has witnessed the explosive growth of the internet of things (IoT), demonstrating the utilization of ubiquitous sensing and computation services. Hence, the industrial IoT (IIoT) is integrated into IoT devices. IIoT is concerned with the limitation of computation and battery [...] Read more.
The last decade has witnessed the explosive growth of the internet of things (IoT), demonstrating the utilization of ubiquitous sensing and computation services. Hence, the industrial IoT (IIoT) is integrated into IoT devices. IIoT is concerned with the limitation of computation and battery life. Therefore, mobile edge computing (MEC) is a paradigm that enables the proliferation of resource computing and reduces network communication latency to realize the IIoT perspective. Furthermore, an open radio access network (O-RAN) is a new architecture that adopts a MEC server to offer a provisioning framework to address energy efficiency and reduce the congestion window of IIoT. However, dynamic resource computation and continuity of task generation by IIoT lead to challenges in management and orchestration (MANO) and energy efficiency. In this article, we aim to investigate the dynamic and priority of resource management on demand. Additionally, to minimize the long-term average delay and computation resource-intensive tasks, the Markov decision problem (MDP) is conducted to solve this problem. Hence, deep reinforcement learning (DRL) is conducted to address the optimal handling policy for MEC-enabled O-RAN architectures. In this study, MDP-assisted deep q-network-based priority/demanding resource management, namely DQG-PD, has been investigated in optimizing resource management. The DQG-PD algorithm aims to solve resource management and energy efficiency in IIoT devices, which demonstrates that exploiting the deep Q-network (DQN) jointly optimizes computation and resource utilization of energy for each service request. Hence, DQN is divided into online and target networks to better adapt to a dynamic IIoT environment. Finally, our experiment shows that our work can outperform reference schemes in terms of resources, cost, energy, reliability, and average service completion ratio. Full article
Show Figures

Figure 1

44 pages, 3458 KiB  
Review
Network Data Plane Programming Languages: A Survey
by Belén Brandino and Eduardo Grampín
Computers 2024, 13(12), 314; https://doi.org/10.3390/computers13120314 - 26 Nov 2024
Viewed by 796
Abstract
Network data plane programming is a consequence of the evolution of the concept of control and data plane separation, stated two decades ago, and established on the Software-Defined Networking (SDN) architecture. The concept has been evolving since its initial implementation using the OpenFlow [...] Read more.
Network data plane programming is a consequence of the evolution of the concept of control and data plane separation, stated two decades ago, and established on the Software-Defined Networking (SDN) architecture. The concept has been evolving since its initial implementation using the OpenFlow protocol, whereby an omniscient external entity, the controller, dynamically configures the forwarding of network devices, which are basically “dummies”. In this paper, we review network data plane programming languages, describing their theoretical characteristics and presenting examples and possible targets in order to compare them, in search of the best solutions to have a network of dynamically programmable devices that allow the network operator to deploy innovative use cases without depending on the manufacturer, promoting innovation. The main contribution is to gather in one place the existing languages, present them, and compare different features to help the operator and programmers. Overall, we conclude that today, the language with the most development and device targets is P4, although there are many developments based on XDP and eBPF that can be useful when implementing a programmable network solution. Full article
Show Figures

Figure 1

20 pages, 11838 KiB  
Article
Advanced SDR-Based Custom OFDM Protocol for Improved Data Rates in HF-NVIS Links
by Emil Șorecău, Mirela Șorecău and Paul Bechet
Appl. Sci. 2024, 14(23), 10841; https://doi.org/10.3390/app142310841 - 22 Nov 2024
Viewed by 653
Abstract
In the current context of global communications, HF (High Frequency) NVIS (Near Vertical Incidence Skywave) data networks can be of strategic importance, providing short- and medium-range communication capabilities independent of terrestrial configuration and existing conventional communications infrastructure. They are essential in critical conditions, [...] Read more.
In the current context of global communications, HF (High Frequency) NVIS (Near Vertical Incidence Skywave) data networks can be of strategic importance, providing short- and medium-range communication capabilities independent of terrestrial configuration and existing conventional communications infrastructure. They are essential in critical conditions, such as natural disasters or conflicts, when terrestrial networks are unavailable. This paper investigates the development of such systems for HF NVIS data communications by introducing a customized Orthogonal Frequency Division Multiplexing (OFDM) protocol with parameters adapted to HF ionospheric propagation, implemented on Software-Defined Radio (SDR) systems, which provide extensive configurability and high adaptability to varying HF channel conditions. This work presents an innovative approach to the application of OFDM narrow-channel aggregation in the HF spectrum, a technique that significantly enhances system performance. The aggregation enables a more efficient utilization of the available spectrum and an increase in the data transmission rate, which represents a substantial advancement in NVIS communications. The implementation was realized using an SDR system, which allows flexible integration of the new OFDM protocol and dynamic adaptation of resources. The work also includes the development of a messaging application capable of using this enhanced HF communication system, taking advantage of the new features of channel aggregation and SDR flexibility. This application demonstrates the applicability of the protocol in real-world scenarios and provides a robust platform for data transmission under conditions of limited access to other means of communication. Thus, this study contributes to the technological advancement of NVIS communications and opens new research and deployment directions in HF communications. Full article
(This article belongs to the Special Issue Cognitive Radio: Trends, Methods, Applications and Challenges)
Show Figures

Figure 1

20 pages, 3578 KiB  
Article
TOAR: Toward Resisting AS-Level Adversary Correlation Attacks Optimal Anonymous Routing
by Hui Zhao and Xiangmei Song
Mathematics 2024, 12(23), 3640; https://doi.org/10.3390/math12233640 - 21 Nov 2024
Viewed by 456
Abstract
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks by manipulating the underlying routing, thereby compromising anonymity. [...] Read more.
The Onion Router (Tor), as the most widely used anonymous network, is vulnerable to traffic correlation attacks by powerful passive adversaries, such as Autonomous Systems (AS). AS-level adversaries increase their chances of executing correlation attacks by manipulating the underlying routing, thereby compromising anonymity. Furthermore, these underlying routing detours in the Tor client’s routing inference introduce extra latency. To address this challenge, we propose Toward Resisting AS-level Adversary Correlation Attacks Optimal Anonymous Routing (TOAR). TOAR is a two-stage routing mechanism based on Bayesian optimization within Software Defined Networks (SDN), comprising route search and route forwarding. Specifically, it searches for routes that conform to established policies, avoiding AS that could connect traffic between clients and destinations while maintaining anonymity in the selection of routes that minimize communication costs. To evaluate the anonymity of TOAR, as well as the effectiveness of route searching and the performance of route forwarding, we conduct a detailed analysis and extensive experiments. The analysis and experimental results show that the probability of routing being compromised by correlation attacks is significantly reduced. Compared to classical enumeration-based methods, the success rate of route searching increased by close to 2.5 times, and the forwarding throughput reached 70% of that of the packet transmission. The results show that TOAR effectively improves anonymity while maintaining communication quality, minimizing anonymity loss from AS-level adversaries and reducing high latency from routing detours. Full article
Show Figures

Figure 1

22 pages, 945 KiB  
Review
Resilience in the Internet of Medical Things: A Review and Case Study
by Vikas Tomer, Sachin Sharma and Mark Davis
Future Internet 2024, 16(11), 430; https://doi.org/10.3390/fi16110430 - 20 Nov 2024
Viewed by 961
Abstract
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare [...] Read more.
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare domain due to its profound impact on health and public well-being. Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. Several other situations, such as natural disasters, war, construction works, etc., can cause IoMT networks to become unavailable and fail to transmit the data. The first step in these situations is to recover from failure as quickly as possible, resume the data transfer, and detect the cause of faults, failures, and errors. Several solutions exist in the literature to make the IoMT resilient to failure. However, no single approach proposed in the literature can simultaneously protect the IoMT networks from various attacks, failures, and faults. This paper begins with a detailed description of IoMT and its applications. It considers the underlying requirements of resilience for IoMT networks, such as monitoring, control, diagnosis, and recovery. This paper comprehensively analyzes existing research efforts to provide IoMT network resilience against diverse causes. After investigating several research proposals, we identify that the combination of software-defined networks (SDNs), machine learning (ML), and microservices architecture (MSA) has the capabilities to fulfill the requirements for achieving resilience in the IoMT networks. It mainly focuses on the analysis of technologies, such as SDN, ML, and MSA, separately, for meeting the resilience requirements in the IoMT networks. SDN can be used for monitoring and control, and ML can be used for anomaly detection and diagnosis, whereas MSA can be used for bringing distributed functionality and recovery into the IoMT networks. This paper provides a case study that describes the remote patient monitoring (RPM) of a heart patient in IoMT networks. It covers the different failure scenarios in IoMT infrastructure. Finally, we provide a proposed methodology that elaborates how distributed functionality can be achieved during these failures using machine learning, software-defined networks, and microservices technologies. Full article
(This article belongs to the Special Issue The Future Internet of Medical Things II)
Show Figures

Figure 1

25 pages, 2987 KiB  
Article
Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work
by Syed Muhammad Zohaib, Syed Muhammad Sajjad, Zafar Iqbal, Muhammad Yousaf, Muhammad Haseeb and Zia Muhammad
Information 2024, 15(11), 734; https://doi.org/10.3390/info15110734 - 17 Nov 2024
Viewed by 1498
Abstract
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises [...] Read more.
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices effectively. However, the technology raises concerns, including security threats, latency, throughput, and scalability, among others. These newer-generation threats are more complex and frequent, which makes the legacy approach to security ineffective. This research paper gives an overview of contemporary technologies used across enterprises, including the VPNs, Zero Trust Network Access (ZTNA), proxy servers, Secure Shell (SSH) tunnels, the software-defined wide area network (SD-WAN), and Secure Access Service Edge (SASE). This paper also presents a comprehensive cybersecurity framework named Zero Trust VPN (ZT-VPN), which is a VPN solution based on Zero Trust principles. The proposed framework aims to enhance IT security and privacy for modern enterprises in remote work environments and address concerns of latency, throughput, scalability, and security. Finally, this paper demonstrates the effectiveness of the proposed framework in various enterprise scenarios, highlighting its ability to prevent data leaks, manage access permissions, and provide seamless security transitions. The findings underscore the importance of adopting ZT-VPN to fortify cybersecurity frameworks, offering an effective protection tool against contemporary cyber threats. This research serves as a valuable reference for organizations aiming to enhance their security posture in an increasingly hostile threat landscape. Full article
(This article belongs to the Special Issue Feature Papers in Information in 2024–2025)
Show Figures

Figure 1

Back to TopTop