You are currently on the new version of our website. Access the old version .

Network, Volume 2, Issue 1

March 2022 - 13 articles

Cover Story: Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to the lack of Internet connectivity and the isolated nature of ships in the sea, is showing a 900% increase in cybersecurity breaches on operational technology as it enters the digital era. Although some research is being conducted in this area, maritime cybersecurity has not been deeply investigated. Hence, this paper provides a close investigation of the landscape of cybersecurity in the maritime sector with the aim of highlighting security problems and challenges. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Article
  • Open Access
2 Citations
2,918 Views
13 Pages

EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback

  • Yingyuan Yang,
  • Jiangnan Li,
  • Sunshin Lee,
  • Xueli Huang and
  • Jinyuan Sun

21 March 2022

Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sampled from various sensors. Identifying the illegitimate user through constantly analyzing current users’ behavior, IA adds another layer of pro...

  • Article
  • Open Access
1 Citations
3,824 Views
22 Pages

Cluster-Based Transmission Diversity Optimization in Ultra Reliable Low Latency Communication

  • Md. Amirul Hasan Shanto,
  • Binodon,
  • Amit Karmaker,
  • Md. Mahfuz Reza and
  • Md. Abir Hossain

17 March 2022

Intra-vehicular communication is an emerging technology explored spontaneously due to higher wireless sensor-based application demands. To meet the upcoming market demands, the current intra-vehicular communication transmission reliability and latenc...

  • Feature Paper
  • Article
  • Open Access
20 Citations
6,762 Views
15 Pages

5G Network Slice Isolation

  • Stan Wong,
  • Bin Han and
  • Hans D. Schotten

8 March 2022

This article reveals an adequate comprehension of basic defense, security challenges, and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept of providing mobile network on-demand and expanding mobile network...

  • Feature Paper
  • Article
  • Open Access
13 Citations
3,207 Views
14 Pages

7 March 2022

Given the enormous interest shown by customers as well as industry in autonomous vehicles, the concept of Internet of Vehicles (IoV) has evolved from Vehicular Ad hoc NETworks (VANETs). VANETs are likely to play an important role in Intelligent Trans...

  • Feature Paper
  • Review
  • Open Access
99 Citations
45,137 Views
16 Pages

Cybersecurity Challenges in the Maritime Sector

  • Frank Akpan,
  • Gueltoum Bendiab,
  • Stavros Shiaeles,
  • Stavros Karamperidis and
  • Michalis Michaloliakos

7 March 2022

Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which unt...

  • Feature Paper
  • Article
  • Open Access
19 Citations
5,698 Views
17 Pages

A Dynamic Service Placement Based on Deep Reinforcement Learning in Mobile Edge Computing

  • Shuaibing Lu,
  • Jie Wu,
  • Jiamei Shi,
  • Pengfan Lu,
  • Juan Fang and
  • Haiming Liu

24 February 2022

Mobile edge computing is an emerging paradigm that supplies computation, storage, and networking resources between end devices and traditional cloud data centers. With increased investment of resources, users demand a higher quality-of-service (QoS)....

  • Feature Paper
  • Article
  • Open Access
9 Citations
3,126 Views
23 Pages

11 February 2022

This paper proposes a routing protocol for wireless sensor networks to deal with energy-depleting vampire attacks. This resource-conserving protection against energy-draining (RCPED) protocol is compatible with existing routing protocols to detect ab...

  • Feature Paper
  • Article
  • Open Access
8 Citations
5,624 Views
15 Pages

25 January 2022

With the rapid advancement and wide application of blockchain technology, blockchain consensus protocols, which are the core part of blockchain systems, along with the privacy issues, have drawn much attention from researchers. A key aspect of privac...

  • Feature Paper
  • Article
  • Open Access
16 Citations
5,039 Views
13 Pages

Challenges in Physical Layer Security for Visible Light Communication Systems

  • Sunghwan Cho,
  • Gaojie Chen,
  • Justin P. Coon and
  • Pei Xiao

20 January 2022

This article highlights challenges associated with securing visible light communication (VLC) systems by using physical layer security (PLS) techniques. Motivated by the achievements in PLS studies for radio frequency (RF) communication, many PLS tec...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Network - ISSN 2673-8732