Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 12 , Issue 2 , PP: 75-88, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure

Ali Kadhim Nsaif 1 *

  • 1 Department of Software Engineering, South Tehran Azad University, Tehran, Iran - (alikadem.2025@gmail.com)
  • Doi: https://doi.org/10.54216/JISIoT.120206

    Received: March 02, 2024 Revised: Aprial 03, 2024 Accepted: April: 19, 2024
    Abstract

    The seamless integration of technology for computing into everyday items and environments is known as pervasive computing. To protect against cyber threats and vulnerabilities, robust security mechanisms are necessary. Conventional security measures, including gateways and the use of encryption, may not be sufficient to address the unique challenges encountered in ubiquitous computing systems. But these techniques are still vital. In addition to the variety of devices, resource limitations, mobility needs, and the possibility of large-scale distributed attacks, these obstacles also include the potential for attack. Network virtualization, that abstracts and separates network facilities and functions, is a promising way to increasing security in pervasive computing deployments: it abstracts and isolates network resources and processes. Wireless communication play a significant part in the development of a digital infrastructure that is both resilient and trustworthy. The processes of dynamic resource allocation, isolation, and management of network bandwidth are made possible through the utilization of virtualization, leads to the proposal of Secure Wireless Virtual Resource Allocation and Authentication Algorithm(SWVRA3) to make the abstraction of the network's physical resources into virtualized entities By using network virtualization, pervasive computing applications and services can be secured with logically segregated virtual networks. The cross-contamination and security breaches can be reduced by this separation. Furthermore, flexible configuration, dynamic allocation of resources, and centralized virtual control are allowed by network visualization that improves threat incidence response, enforcement of policies, and security surveillance.

    Keywords :

    Network security , Computing network , Authentication accuracy , Wireless sensor network , Virtualization , Resource utilization

    References

    [1]    Darch Abed Dawar, A. (2024). Enhancing Wireless Security and Privacy: A 2-Way Identity Authentication Method for 5G Networks. International Journal of Mathematics, Statistics, and Computer Science, 2, 183–198. https://doi.org/10.59543/ijmscs.v2i.9073

    [2] Ren, J., & Li, X. (2022). Wireless Network Virtualization Resource Sharing Based on Dynamic Resource Allocation Algorithm. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/5654188

    [3]    Wu, W., Zhou, C., Li, M., Wu, H., Zhou, H., Zhang, N., ... & Zhuang, W. (2022). AI-native network slicing for 6G networks. IEEE Wireless Communications, 29(1), 96-103.  

    [4]  Slimani, K., Khoulji, S., & Kerkeb, M. L. (2023). Advancements and Challenges in Energy-efficient 6G Mobile Communication Network. In E3S Web of Conferences (Vol. 412, p. 01036). EDP Sciences. https://doi.org/10.1051/e3sconf/202341201036

    [5]    Taşkin, D., & Taşkin, C. (2021). Container-based virtualization for bluetooth low energy sensor devices in internet of things applications. Tehnički vjesnik, 28(1), 13-19. https://doi.org/10.17559/TV-20180528134139

    [6]    Niyato, D. (2024). Editorial First Quarter 2024 IEEE Communications Surveys and Tutorials. IEEE Communications Surveys & Tutorials, 26(1), i-vi. https://doi.org/10.1109/COMST.2024.3356268

    [7] Wang, Y., & Li, W. (2022). International Trade Transportation Cost Based on Internet of Things-Assisted Wireless Network Virtualization. Wireless Communications and Mobile Computing, 2022. https://doi.org/10.1155/2022/3591338

    [8]  Saad, A., Al-Ma’aitah, M., & Alwadain, A. (2020). 6G technology based advanced virtual multi-purpose embedding algorithm to solve far-reaching network effects. ComputerCommunications, 160,749-758. https://doi.org/10.1016/j.comcom.2020.07.025

    [9] Chamola, V., Patra, S., Kumar, N., & Guizani, M. (2020). Fpga for 5g: Re-configurable hardware for next generation communication. IEEE Wireless Communications, 27(3), 140-147. https://doi.org/10.1109/MWC.001.1900359

    [10] Nazir, M., Sabah, A., Sarwar, S., Yaseen, A., & Jurcut, A. (2021). Power and resource allocation in wireless communication network. Wireless Personal Communications, 119(4), 3529-3552. https://doi.org/10.1007/s11277-021-08419-x

    [11] Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Blockchain for 5G and beyond networks: A state of the art survey. Journal of Network and Computer Applications, 166, 102693. https://doi.org/10.1016/j.jnca.2020.102693

    [12] Parashar, J., Jain, A., Meena, L., & Kapoor, S. (2023). 5G Network Security Challenges and Solutions. JOURNAL OF INTELLIGENT SYSTEMS AND COMPUTING, 4(2), 1-13. https://n2t.net/ark:/47543/JISCOM2023.v4i2.a36

    [13] El Amri, A., & Meddeb, A. (2021). Optimal server selection for competitive service providers in network virtualization context. Telecommunication Systems, 77(3), 451-467. https://doi.org/10.1007/s11235-021-00764-3

    [14] Liu, B., & Han, C. (2022). Research on wireless network virtualization positioning technology based on next-generation agile IoT technology. Journal of Interconnection Networks, 2150029. https://doi.org/10.1142/S0219265921500298

    [15] Nguyen, T., Tran, N., Loven, L., Partala, J., Kechadi, M. T., & Pirttikangas, S. (2020). Privacy-aware blockchain innovation for 6G: Challenges and opportunities. 2020 2nd 6G WirelessSummit(6GSUMMIT),1-5. https://doi.org/10.1109/6GSUMMIT49458.2020.9083832

    [16] Tariq, F., Khandaker, M. R., Wong, K. K., Imran, M. A., Bennis, M., & Debbah, M. (2020). A speculative study on 6G. IEEE Wireless Communications, 27(4), 118-125. https://doi.org/10.1109/MWC.001.1900488

    [17] Chen, Y., Liu, W., Niu, Z., Feng, Z., Hu, Q., & Jiang, T. (2020). Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies. Digital communications and networks, 6(3), 312-320. https://doi.org/10.1016/j.dcan.2020.07.002

    [18] Cano, L., Capone, A., & Sansò, B. (2020). On the evolution of infrastructure sharing in mobile networks: a survey. ITU Journal on Future and Evolving Technology, 1(1), 21. https://publications.polymtl.ca/9467/

    [19] Akyildiz, I. F., Kak, A., & Nie, S. (2020). 6G and beyond: The future of wireless communicationssystems. IEEEaccess, 8,133995-134030. https://doi.org/10.1109/ACCESS.2020.3010896

    [20] AlQahtani, S. A., & Alhomiqani, W. A. (2020). A multi-stage analysis of network slicing architecture for 5G mobile networks. Telecommunication Systems, 73(2), 205-221. https://doi.org/10.1007/s11235-019-00607-2

    [21] Chang, Z., & Chen, T. (2021). Virtual resource allocation for wireless virtualized heterogeneous network with hybrid energy supply. IEEE Transactions on Wireless Communications, 21(3), 1886-1896. https://doi.org/10.1109/TWC.2021.3107867

    [22] Benomar, Z., Longo, F., Merlino, G., & Puliafito, A. (2021). Cloud-based network virtualization in iot with openstack. ACM Transactions on Internet Technology (TOIT), 22(1), 1-26. https://doi.org/10.1145/3460818

    [23] Alshammari, A. R. (2020). Resilient Wireless Network Virtualization with Edge Computing and Cyber Deception (Doctoral dissertation, Howard University). https://www.proquest.com/openview/7305e6e268b0faab81fa1d69b328d69f/1?pq-origsite=gscholar&cbl=18750&diss=y

    [24] Xue, P., & Jiang, Z. (2021). SecRouting: Secure routing for network functions virtualization (NFV) technology. IEEE Transactions on Circuits and Systems II: Express Briefs, 69(3), 1727-1731. https://doi.org/10.1109/TCSII.2021.3119938

    [25] Wang, Y., Kang, X., Li, T., Wang, H., Cheng, C., & Lei, Z. (2023). SIX-Trust for 6G: Towards a Secure and Trustworthy Future Network. IEEE Access. https://doi.org/10.1109/ACCESS.2023.3321114

    [26] El-Haggar, N., Amouri, L., Alsumayt, A., Alghamedy, F. H., & Aljameel, S. S. (2023). The Effectiveness and Privacy Preservation of IoT on Ubiquitous Learning: Modern Learning Paradigm to Enhance Higher Education. Applied Sciences, 13(15), 9003. https://doi.org/10.3390/app13159003

    [27] Khan, I., Belqasmi, F., Glitho, R., Crespi, N., Morrow, M., & Polakos, P. (2015). Wireless sensor network virtualization: A survey. IEEE Communications Surveys & Tutorials, 18(1), 553-576. https://doi.org/10.1109/COMST.2015.2412971

    [28] Alam, I., Sharif, K., Li, F., Latif, Z., Karim, M. M., Biswas, S., ... & Wang, Y. (2020). A survey of network virtualization techniques for internet of things using sdn and nfv. ACM Computing Surveys (CSUR), 53(2), 1-40. https://doi.org/10.1145/3379444

    Cite This Article As :
    Kadhim, Ali. Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2024, pp. 75-88. DOI: https://doi.org/10.54216/JISIoT.120206
    Kadhim, A. (2024). Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure. Journal of Intelligent Systems and Internet of Things, (), 75-88. DOI: https://doi.org/10.54216/JISIoT.120206
    Kadhim, Ali. Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure. Journal of Intelligent Systems and Internet of Things , no. (2024): 75-88. DOI: https://doi.org/10.54216/JISIoT.120206
    Kadhim, A. (2024) . Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure. Journal of Intelligent Systems and Internet of Things , () , 75-88 . DOI: https://doi.org/10.54216/JISIoT.120206
    Kadhim A. [2024]. Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure. Journal of Intelligent Systems and Internet of Things. (): 75-88. DOI: https://doi.org/10.54216/JISIoT.120206
    Kadhim, A. "Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 75-88, 2024. DOI: https://doi.org/10.54216/JISIoT.120206