Current Issue : January-March Volume : 2025 Issue Number : 1 Articles : 5 Articles
This paper presents an advanced framework for securing 6G communication by integrating deep learning and physical layer security (PLS). The proposed model incorporates multi-stage detection mechanisms to enhance security against various attacks on the 6G air interface. Deep neural networks and a hybrid model are employed for sequential learning to improve classification accuracy and handle complex data patterns. Additionally, spoofing, jamming, and eavesdropping attacks are simulated to refine detection mechanisms. An anomaly detection system is developed to identify unusual signal patterns indicating potential attacks. The results demonstrate that machine learning (ML) and hybrid models outperform conventional approaches, showing improvements of up to 85% in bit error rate (BER) and 24% in accuracy, especially under attack conditions. This research contributes to the advancement of secure 6G communication systems, offering details on effective defence mechanisms against physical layer attacks....
The increasing complexity and scope of military computer networks necessitate robust methods to ensure network stability and security. This study presents a comprehensive analysis of computer network statistics in military local networks to develop a method for detecting information flows that disrupt stability. By leveraging advanced statistical techniques and machine learning algorithms, this research aims to enhance the cybersecurity posture of military local networks globally. Military networks are vital for communication, data exchange, and operational coordination. However, the dynamic nature of network traffic and the persistent threat of cyberattacks pose significant challenges to maintaining network stability. Traditional monitoring techniques often fail to meet the unique requirements of military networks, which demand high levels of security and rapid response capabilities. This study employs a multi-faceted approach to detect anomalies in network traffic, utilizing statistical methods such as Z-score analysis, Principal Component Analysis (PCA), and Autoregressive Integrated Moving Average (ARIMA) models. Machine learning techniques, including Support Vector Machines (SVM), Random Forests, Neural Networks, K-means clustering, and Reinforcement Learning, are also applied to identify patterns indicative of stability-disrupting information flows. The integration of statistical and machine learning methods forms a hybrid model that enhances anomaly detection, providing a robust framework for network security. The research problem is formulated as follows: does data collection include comprehensive network traffic data from various segments of military local area networks, including packet flows, transmission rates, and error rates over a specified period? Statistical analysis identifies patterns in the network traffic, which are then used to train machine learning models to classify normal and abnormal traffic. The research hypothesis states that machine learning models achieve high accuracy in detecting stability-disrupting information flows, with a precision rate exceeding 90%. The models identified several instances of stability-disrupting events, correlating these with known security incidents to validate the effectiveness of the detection method. This study underscores the importance of continuous monitoring and analysis of network statistics to ensure stability and security. The proposed method can be integrated with existing network monitoring and intrusion detection systems, providing a comprehensive approach to network security. Future research can build on these findings to develop more sophisticated models and explore additional factors influencing network stability, including the incorporation of advanced machine learning techniques, such as deep learning, and the exploration of other network metrics, like latency and packet loss. This comprehensive approach aims to enhance the security and operational reliability of military local networks....
It is well known that simulation tools are essential for the design and optimization of wireless communication systems. This paper proposes a Python script that can be used for planning and predicting a connection link budget by analyzing its basic parameters. Our proposal consists of an application that calculates the connection budget for point-to-point links operating at 5 GHz and 11 GHz, taking into account all the necessary microwave parameters. For validating the efficiency of the proposed tool, this paper presents comprehensive simulation results derived from comparing our tool to a couple of other simulation tools by means of calculating the same parameters....
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been observed between IoV and edge computing to support smooth mobility and the use of local resources. However, vehicle travel, especially due to highspeed movement and intersections, can result in IoV devices losing connection and/or processing with high latency. This paper proposes a Cluster Collaboration Vehicular Edge Computing (CCVEC) framework that aims to guarantee and enhance the connectivity between vehicle sensors and the cloud by utilizing the edge computing paradigm in the middle. The objectives are achieved by utilizing the cluster management strategies deployed between cloud and edge computing servers. The framework is implemented in OpenStack cloud servers and evaluated by measuring the throughput, latency, and memory parameters in two different scenarios. The results obtained show promising indications in terms of latency (approximately 390 ms of the ideal status) and throughput (30 kB/s) values, and thus appears acceptable in terms of performance as well as memory....
In response to the problem of inadequate utilization of local information in PolSAR image classification using Vision Transformer in existing studies, this paper proposes a Vision Transformer method considering local information, LIViT. The method replaces image patch sequence with polarimetric feature sequence in the feature embedding, and uses convolution for mapping to preserve image spatial detail information. On the other hand, the addition of the wavelet transform branch enables the network to pay more attention to the shape and edge information of the feature target and improves the extraction of local edge information. The results in Wuhan, China and Flevoland, Netherlands show that considering local information when using Vision Transformer for PolSAR image classification effectively improves the image classification accuracy and shows better advantages in PolSAR image classification....
Loading....