In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic h...In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.展开更多
Based on inverse heat conduction theory, a theoretical model using 6-point Crank-Nicolson finite difference scheme was used to calculate the thermal conductivity from temperature distribution, which can be measured ex...Based on inverse heat conduction theory, a theoretical model using 6-point Crank-Nicolson finite difference scheme was used to calculate the thermal conductivity from temperature distribution, which can be measured experimentally. The method is a direct approach of second-order and the key advantage of the present method is that it is not required a priori knowledge of the functional form of the unknown thermal conductivity in the calculation and the thermal parameters are estimated only according to the known temperature distribution. Two cases were numerically calculated and the influence of experimental deviation on the precision of this method was discussed. The comparison of numerical and analytical results showed good agreement.展开更多
Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the network.IPv6 has introduced new features like Neighbour Discovery Protocol(NDP)and A...Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the network.IPv6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address Auto-configuration Scheme.IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol(ICMPv6).IPv6 is vulnerable to numerous attacks like Denial of Service(DoS)and Distributed Denial of Service(DDoS)which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications.Therefore,an Intrusion Detection System(IDS)is a monitoring system of the security of a network that detects suspicious activities and deals with amassive amount of data comprised of repetitive and inappropriate features which affect the detection rate.A feature selection(FS)technique helps to reduce the computation time and complexity by selecting the optimum subset of features.This paper proposes a method for detecting DDoS flooding attacks(FA)based on ICMPv6 messages using a Binary Flower PollinationAlgorithm(BFPA-FA).The proposed method(BFPA-FA)employs FS technology with a support vector machine(SVM)to identify the most relevant,influential features.Moreover,The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios.The results show that the proposed method BFPAFA achieved the best accuracy rate(97.96%)for the ICMPv6 DDoS detection with a reduced number of features(9)to half the total(19)features.The proven proposed method BFPA-FAis effective in the ICMPv6 DDoS attacks via IDS.展开更多
Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant ...Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant threats to SI,among which DDoS attack will intensify the erosion of limited bandwidth resources.Therefore,this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking,protecting SI from the source.Firstly,to reduce communication overhead,the logarithmic representation of the traffic volume is added to the digests after modeling SI,generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm.Secondly,the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values,deriving the path with non-repeatability and maximum probability.Finally,multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results.Simulation and experimental results show that the scheme can achieve 96.8%tracking accuracy of external and internal DDoS attack at 2.5 seconds,with the communication overhead at 268KB/s,effectively protecting the limited bandwidth resources of SI.展开更多
The increasing demand for infotainment applications necessitates efficient bandwidth and energy resource allocation.Sixth-Generation(6G)networks,utilizing Cognitive Radio(CR)technology within CR Network(CRN),can enhan...The increasing demand for infotainment applications necessitates efficient bandwidth and energy resource allocation.Sixth-Generation(6G)networks,utilizing Cognitive Radio(CR)technology within CR Network(CRN),can enhance spectrum utilization by accessing unused spectrum when licensed Primary Mobile Equipment(PME)is inactive or served by a Primary Base Station(PrBS).Secondary Mobile Equipment(SME)accesses this spectrum through a Secondary Base Station(SrBS)using opportunistic access,i.e.,spectrum sensing.Hybrid Multiple Access(HMA),combining Orthogonal Multiple Access(OMA)and Non-Orthogonal Multiple Access(NOMA),can enhance Energy Efficiency(EE).Additionally,SME Clustering(SMEC)reduces inter-cluster interference,enhancing EE further.Despite these advancements,the integration of CR technology,HMA,and SMEC in CRN for better bandwidth utilization and EE remains unexplored.This paper introduces a new CRassisted SMEC-based Downlink HMA(CR-SMEC-DHMA)method for 6G CRN,aimed at jointly optimizing SME admission,SME association,sum rate,and EE subject to imperfect sensing,collision,and Quality of Service(QoS).A novel optimization problem,formulated as a non-linear fractional programming problem,is solved using the Charnes-Cooper Transformation(CCT)to convert into a concave optimization problem,and an ε-optimal Outer Approximation Algorithm(OAA)is employed to solve the concave optimization problem.Simulations demonstrate the effectiveness of the proposed CR-SMEC-DHMA,surpassing the performance of current OMAenabled CRN,NOMA-enabled CRN,SMEC-OMA enabled CRN,and SMEC-NOMA enabled CRN methods,with ε-optimal results obtained at ε=10^(−3),while satisfying Performance Measures(PMs)including SME admission in SMEC,SME association with SrBS,SME-channel opportunistic allocation through spectrum sensing,sum rate and overall EE within the 6G CRN.展开更多
基金funding from the European Commission by the Ruralities project(grant agreement no.101060876).
文摘In this paper,we propose a new privacy-aware transmission scheduling algorithm for 6G ad hoc networks.This system enables end nodes to select the optimum time and scheme to transmit private data safely.In 6G dynamic heterogeneous infrastructures,unstable links and non-uniform hardware capabilities create critical issues regarding security and privacy.Traditional protocols are often too computationally heavy to allow 6G services to achieve their expected Quality-of-Service(QoS).As the transport network is built of ad hoc nodes,there is no guarantee about their trustworthiness or behavior,and transversal functionalities are delegated to the extreme nodes.However,while security can be guaranteed in extreme-to-extreme solutions,privacy cannot,as all intermediate nodes still have to handle the data packets they are transporting.Besides,traditional schemes for private anonymous ad hoc communications are vulnerable against modern intelligent attacks based on learning models.The proposed scheme fulfills this gap.Findings show the probability of a successful intelligent attack reduces by up to 65%compared to ad hoc networks with no privacy protection strategy when used the proposed technology.While congestion probability can remain below 0.001%,as required in 6G services.
文摘Based on inverse heat conduction theory, a theoretical model using 6-point Crank-Nicolson finite difference scheme was used to calculate the thermal conductivity from temperature distribution, which can be measured experimentally. The method is a direct approach of second-order and the key advantage of the present method is that it is not required a priori knowledge of the functional form of the unknown thermal conductivity in the calculation and the thermal parameters are estimated only according to the known temperature distribution. Two cases were numerically calculated and the influence of experimental deviation on the precision of this method was discussed. The comparison of numerical and analytical results showed good agreement.
文摘Internet Protocol version 6(IPv6)is the latest version of IP that goal to host 3.4×10^(38)unique IP addresses of devices in the network.IPv6 has introduced new features like Neighbour Discovery Protocol(NDP)and Address Auto-configuration Scheme.IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol(ICMPv6).IPv6 is vulnerable to numerous attacks like Denial of Service(DoS)and Distributed Denial of Service(DDoS)which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications.Therefore,an Intrusion Detection System(IDS)is a monitoring system of the security of a network that detects suspicious activities and deals with amassive amount of data comprised of repetitive and inappropriate features which affect the detection rate.A feature selection(FS)technique helps to reduce the computation time and complexity by selecting the optimum subset of features.This paper proposes a method for detecting DDoS flooding attacks(FA)based on ICMPv6 messages using a Binary Flower PollinationAlgorithm(BFPA-FA).The proposed method(BFPA-FA)employs FS technology with a support vector machine(SVM)to identify the most relevant,influential features.Moreover,The ICMPv6-DDoS dataset was used to demonstrate the effectiveness of the proposed method through different attack scenarios.The results show that the proposed method BFPAFA achieved the best accuracy rate(97.96%)for the ICMPv6 DDoS detection with a reduced number of features(9)to half the total(19)features.The proven proposed method BFPA-FAis effective in the ICMPv6 DDoS attacks via IDS.
基金supported by the National Key R&D Program of China(Grant No.2022YFA1005000)the National Natural Science Foundation of China(Grant No.62025110 and 62101308).
文摘Satellite Internet(SI)provides broadband access as a critical information infrastructure in 6G.However,with the integration of the terrestrial Internet,the influx of massive terrestrial traffic will bring significant threats to SI,among which DDoS attack will intensify the erosion of limited bandwidth resources.Therefore,this paper proposes a DDoS attack tracking scheme using a multi-round iterative Viterbi algorithm to achieve high-accuracy attack path reconstruction and fast internal source locking,protecting SI from the source.Firstly,to reduce communication overhead,the logarithmic representation of the traffic volume is added to the digests after modeling SI,generating the lightweight deviation degree to construct the observation probability matrix for the Viterbi algorithm.Secondly,the path node matrix is expanded to multi-index matrices in the Viterbi algorithm to store index information for all probability values,deriving the path with non-repeatability and maximum probability.Finally,multiple rounds of iterative Viterbi tracking are performed locally to track DDoS attack based on trimming tracking results.Simulation and experimental results show that the scheme can achieve 96.8%tracking accuracy of external and internal DDoS attack at 2.5 seconds,with the communication overhead at 268KB/s,effectively protecting the limited bandwidth resources of SI.
文摘The increasing demand for infotainment applications necessitates efficient bandwidth and energy resource allocation.Sixth-Generation(6G)networks,utilizing Cognitive Radio(CR)technology within CR Network(CRN),can enhance spectrum utilization by accessing unused spectrum when licensed Primary Mobile Equipment(PME)is inactive or served by a Primary Base Station(PrBS).Secondary Mobile Equipment(SME)accesses this spectrum through a Secondary Base Station(SrBS)using opportunistic access,i.e.,spectrum sensing.Hybrid Multiple Access(HMA),combining Orthogonal Multiple Access(OMA)and Non-Orthogonal Multiple Access(NOMA),can enhance Energy Efficiency(EE).Additionally,SME Clustering(SMEC)reduces inter-cluster interference,enhancing EE further.Despite these advancements,the integration of CR technology,HMA,and SMEC in CRN for better bandwidth utilization and EE remains unexplored.This paper introduces a new CRassisted SMEC-based Downlink HMA(CR-SMEC-DHMA)method for 6G CRN,aimed at jointly optimizing SME admission,SME association,sum rate,and EE subject to imperfect sensing,collision,and Quality of Service(QoS).A novel optimization problem,formulated as a non-linear fractional programming problem,is solved using the Charnes-Cooper Transformation(CCT)to convert into a concave optimization problem,and an ε-optimal Outer Approximation Algorithm(OAA)is employed to solve the concave optimization problem.Simulations demonstrate the effectiveness of the proposed CR-SMEC-DHMA,surpassing the performance of current OMAenabled CRN,NOMA-enabled CRN,SMEC-OMA enabled CRN,and SMEC-NOMA enabled CRN methods,with ε-optimal results obtained at ε=10^(−3),while satisfying Performance Measures(PMs)including SME admission in SMEC,SME association with SrBS,SME-channel opportunistic allocation through spectrum sensing,sum rate and overall EE within the 6G CRN.