Next Article in Journal
Noise-to-Convex: A Hierarchical Framework for SAR Oriented Object Detection via Scattering Keypoint Feature Fusion and Convex Contour Refinement
Next Article in Special Issue
Elastic Balancing of Communication Efficiency and Performance in Federated Learning with Staged Clustering
Previous Article in Journal
Fusing Skeleton-Based Scene Flow for Gesture Recognition on Point Clouds
Previous Article in Special Issue
A Novel Face Swapping Detection Scheme Using the Pseudo Zernike Transform Based Robust Watermarking
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Network Security Management in Heterogeneous Networks

1
School of Cyberspace Science and Technology, Beijing Jiaotong University, Beijing 100044, China
2
School of Information Engineering, Minzu University of China, Beijing 100081, China
3
School of Computer Science and Engineering, Nanyang Technological University, Nanyang Avenue, Singapore 639798, Singapore
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(3), 568; https://doi.org/10.3390/electronics14030568
Submission received: 26 January 2025 / Accepted: 27 January 2025 / Published: 31 January 2025
(This article belongs to the Special Issue Network Security Management in Heterogeneous Networks)
Heterogeneous networks, as a critical component of modern communication technology, have experienced rapid development in recent years [1]. The emergence of technologies like 5G [2], the Internet of Things (IoT) [3,4], and edge computing [5] has significantly enhanced the diversity and complexity of heterogeneous networks [6], making them pivotal for diverse application demands.
However, the openness and diverse characteristics of heterogeneous networks expose them to serious security challenges [7,8]. Such networks are vulnerable to attacks like Distributed Denial of Service (DDoS) attacks [9], malware propagation [10], and jamming attacks [11], posing significant risks to system stability and data privacy.
To address these pressing security challenges, researchers have developed a variety of defense strategies aimed at mitigating risks in heterogeneous networks [12,13,14,15,16,17]. Compared to traditional approaches, these strategies exhibit several distinct advantages, such as the ability to efficiently handle large amounts of data while ensuring data security, flexibility in tackling various security challenges, and resilience against advanced and persistent cyberattacks. These approaches provide significant theoretical and practical support for improving the security of heterogeneous networks.
The rapid growth of deepfake technology represents a societal risk [18]. The first contribution to this Special Issue (Contribution 1) proposes a forensic defense method with robust pseudo-Zernike moment watermarks. It employs an adaptive strategy to embed a watermark in the image background, acting as a detection marker. After experimental validation, it was found that the method can effectively improve the robustness of face-switching detection in complex environments and in the presence of disturbances. On the other hand, poor-quality images tend to hamper accurate threat detection, which, in turn, affects the proper functioning of security measures [19]. In Contribution 2, the authors propose an unsupervised low-light image enhancement method using a U-net neural network based on Retinex theory and a Convolutional Block Attention Module (CBAM). The method effectively enhances image details during image decomposition using Retinex theory, while a local adaptive enhancement function is applied to improve reflection map brightness. In addition, the designed loss function addresses the challenges of denoising, brightness enhancement, illumination smoothness, and color restoration.
The growth of low-carbon transport, spurred by environmental policies and technological advances, highlights the importance of energy trading [20]. The issue of energy trading in the electric vehicle (EV) market is beginning to attract attention from researchers. Contribution 3 presents a multi-agent reinforcement learning (MADRL)-based auction algorithm to optimize distributed energy trading in EV charger-sharing networks, enhancing social welfare and efficiency. This approach leverages blockchain technology to ensure the transparency and immutability of transactions, providing users with a transparent and decentralized trading platform. Deep reinforcement learning (DRL) techniques are used to train agents (such as EVs or charging stations) to make optimal decisions in uncertain environments. Contribution 4 presents a blockchain-based framework for secure electricity trading between EV operators and the electricity market. A Stackelberg game model using the Tiny DRL algorithm is proposed to optimize trading strategies, enhancing efficiency in uncertain markets.
Entity and relation extraction plays a key role in real-time cybersecurity monitoring and analysis [21]. Contribution 5 introduces a model for entity and relation extraction using an attention mechanism and a Graph Convolutional Network (GCN). The method uses sequence labeling for entity span detection and employs multi-feature fusion to identify all entity spans and build an entity span matrix. Next, based on the attention mechanism, the authors construct an entity relation matrix to represent correlations between entities. Finally, the entity span matrix and entity relation weighted matrix are fed into the GCN for unified entity and relation extraction.
Contribution 6 addresses the challenge of drug repositioning using Graph Neural Networks (GNNs) to model complex relationships between drugs, diseases, and their subcategories. It incorporates a prototype-based feature-enhancement mechanism (PFEM) along with a dual-task classification head (D3TC) to enhance the representation of these relationships. The proposed method was experimentally validated on four public datasets. The results showed that the method surpasses state-of-the-art approaches, significantly enhancing drug repositioning accuracy and efficiency.
The rapid growth of the Internet of Vehicles (IoV) has led to increased focus on its security challenges [22]. Federated learning (FL) can address security and privacy concerns in the Intelligent Connected Vehicle (ICV) domain [23,24], but still faces challenges like multimodal data integration [25], Byzantine attacks [26], and communication limits [27]. In response to these challenges, Contribution 7 introduces a Byzantine-robust multimodal FL framework to tackle these issues. It counters Byzantine attacks with a gradient compression-based aggregation technique. It incorporates a multimodal learning framework to improve adaptability to complex environments and uses top-k gradient compression to enhance communication efficiency. Contribution 8 addresses the privacy leakage risks associated with model parameter exchange in the peer-to-peer (P2P) architecture of FL for IoV scenarios. To address these risks, a differential privacy scheme is proposed, allowing nodes to dynamically adjust noise levels in their model parameters based on their distances to other nodes. This method balances security and model quality.
In edge computing, security is a key factor affecting system performance and user trust [28,29,30]. The issue of security in Mobile Edge Computing (MEC) scenarios remains an open challenge [31]. To address this, Contribution 9 presents a DRL-based security-aware task-offloading framework. This framework uses an Advanced Encryption Standard (AES) to secure data during task offloading. Furthermore, the task-offloading process is modeled as a Markov Decision Process (MDP) and optimized with a Proximal Policy Optimization (PPO) algorithm to reduce latency and energy use. Contribution 10 introduces an approach based on a large language model (LLM) called the Spatio-Temporal Large Language Model with Edge Computing Servers (STLLM-ECS) to predict industrial production nationwide PM2.5. To address security risks in centralized training, such as data leaks during transmission, the paper introduces an edge-distributed learning framework, STLLM-ECS. The framework uses a novel method, called NodeSort, to divide the nationwide sensor network graph into subgraphs. Data and training tasks for each subgraph are allocated to separate Edge Computing Servers (ECSs), reducing data leakage risks.
To address security challenges in heterogeneous networks, Contribution 11 introduces the optimized multi-objective multipath transmission algorithm (MOMTA-HN). This algorithm integrates multiple objectives into path selection, allowing the calculation of optimal paths. Using these redundant paths, the algorithm provides enhanced protection for communication processes within heterogeneous networks.
Contribution 12 presents MedMixtral 8x7B, a medical LLM using the mixture-of-experts (MoE) architecture and an offloading strategy for IoMT deployment. Using the proposed efficient inference-offloading strategy, the model dynamically allocates its weights between the CPU RAM and disk during run-time, effectively reducing GPU memory consumption. This approach enables the deployment of MedMixtral 8x7B on resource-constrained IoMT devices, thus enhancing user privacy protection.
Community detection is a crucial method for analyzing complex systems and organizational structures [32]. Contribution 13 reinterprets community structure by encoding edge information, highlighting its essence by reducing transmitting edge information uncertainty within community structures. This new definition better captures the intrinsic characteristics of communities. Based on this concept, the community detection algorithm CSIM is proposed, which aims to maximize community structure information as its optimization objective and efficiently approximates optimal community partitioning, with its practical effectiveness validated through experiments.
Scrap detection is key to linking the smelting process with the industrial internet, prioritizing security and privacy [33]. Contribution 14 introduces FedScrap, a layer-wise personalized FL framework that coordinates decentralized scrap data while safeguarding privacy. FedScrap uses a self-attention mechanism to aggregate personalized client models layer-by-layer, prioritizing data relevance. This approach enhances the accuracy of model aggregation while addressing data heterogeneity and protecting data privacy.

Funding

This research was funded by the Talent Fund of Beijing Jiaotong University under Grant number 2023XKRC050; by the National Natural Science Foundation of China (NSFC) under Grant number 62402029, 62302539; by the China Postdoctoral Science Foundation under Grant number 2024T170047, GZC20230223, 2024M750165.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

List of Contributions

  • Lai, Z.; Yao, Z.; Lai, G.; Wang, C.; Feng, R. A Novel Face Swapping Detection Scheme Using the Pseudo Zemike Tranform Based Robust Watermarking. Electronics 2024, 13, 4955. https://doi.org/10.3390/electronics13244955.
  • Jiang, S.; Shi, Y.; Zhang, Y.; Zhang, Y. An Improved Retinex-Based Approach Based on Attention Mechanisms for Low-Light Image Enhancement. Electronics 2024, 13, 3645. https://doi.org/10.3390/electronics13183645.
  • Han, Y.; Meng, J.; Luo, Z. Multi-Agent Deep Reinforcement Learning for Blockchain-Based Energy Trading in Decentralized Electric Vehicle Charger-Sharing Networks. Electronics 2024, 13, 4235. https://doi.org/10.3390/electronics13214235.
  • Xiao, Y.; Lin, X.; Lei, Y.; Gu, Y.; Tang, J.; Zhang, F.; Qian, B. Blockchain-Assisted Secure Energy Trading in Electricity Markets: A Tiny Deep Reinforcement Learning-Based Stackelberg Game Approach. Electronics 2024, 13, 3647. https://doi.org/10.3390/electronics13183647.
  • Gao, C.; Xu, G.; Meng, Y. Integrated Extraction of Entities and Relations via Attentive Graph Convolutional Networks. Electronics 2024, 13, 4373. https://doi.org/10.3390/electronics13224373.
  • Lu, R.; Liang, Y.; Lin, J.; Chen, Y. Graph Neural Network-Based Modeling with Subcategory Exploration for Drug Repositioning. Electronics 2024, 13, 3835. https://doi.org/10.3390/electronics13193835.
  • Wu, N.; Lin, X.; Lu, J.; Zhang, F.; Chen, W.; Tang, J.; Xiao, J. Byzantine-Robust Multimodal Federated Learning Framework for Intelligent Connected Vehicle. Electronics 2024, 13, 3635. https://doi.org/10.3390/electronics13183635.
  • Zhao, J.; Guo, Y.; Yang, B.; Wang, Y. P2P Federated Learning Based on Node Segmentation with Privacy Protection for IoV. Electronics 2024, 13, 2276. https://doi.org/10.3390/electronics13122276.
  • Lu, H.; He, X.; Zhang, D. Security-Aware Task Offloading Using Deep Reinforcement Learning in Mobile Edge Computing Systems. Electronics 2024, 13, 2933. https://doi.org/10.3390/electronics13152933.
  • Yin, C.; Mao, Y.; He, Z.; Chen, M.; He, X.; Rong, Y. Edge Computing-Enabled Secure Forecasting Nationwide Industry PM2.5 with LLM in the Heterogeneous Network. Electronics 2024, 13, 2581. https://doi.org/10.3390/electronics13132581.
  • Qi, S.; Yang, L.; Ma, L.; Jiang, S.; Zhou, Y.; Cheng, G. MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks. Electronics 2024, 13, 2697. https://doi.org/10.3390/electronics13142697.
  • Yuan, X.; Kong, W.; Luo, Z.; Xu, M. Efficient Inference Offloading for Mixture-of-Experts Large Language Models in Internet of Medical Things. Electronics 2024, 13, 2077. https://doi.org/10.3390/electronics13112077.
  • Liu, Y.; Liu, W.; Tang, X.; Yin, H.; Yin, P.; Xu, X.; Wang, Y. CSIM: A Fast Community Detection Algorithm Based on Structure Information Maximization. Electronics 2024, 13, 1119. https://doi.org/10.3390/electronics13061119.
  • Zhang, W.; Deng, D.; Wang, L. FedScrap: Layer-Wise Personalized Federated Learning for Scrap Detection. Electronics 2024, 13, 527. https://doi.org/10.3390/electronics13030527.

References

  1. Xu, Y.; Gui, G.; Gacanin, H.; Adachi, F. A survey on resource allocation for 5G heterogeneous networks: Current research, future trends, and challenges. IEEE Commun. Surv. Tutor. 2021, 23, 668–695. [Google Scholar] [CrossRef]
  2. Zhang, R.; Xiong, K.; Lu, Y.; Ng, D.W.K.; Fan, P.; Letaief, K.B. SWIPT-Enabled Cell-Free Massive MIMO-NOMA Networks: A Machine Learning-Based Approach. IEEE Trans. Wirel. Commun. 2024, 23, 6701–6718. [Google Scholar] [CrossRef]
  3. Wang, J.; Du, H.; Niyato, D.; Kang, J.; Cui, S.; Shen, X.S.; Zhang, P. Generative AI for integrated sensing and communication: Insights from the physical layer perspective. IEEE Wirel. Commun. 2024, 31, 246–255. [Google Scholar] [CrossRef]
  4. Wang, J.; Du, H.; Niyato, D.; Xiong, Z.; Kang, J.; Ai, B.; Han, Z.; Kim, D.I. Generative Artificial Intelligence Assisted Wireless Sensing: Human Flow Detection in Practical Communication Environments. IEEE J. Sel. Areas Commun. 2024, 42, 2737–2753. [Google Scholar] [CrossRef]
  5. Zhang, R.; Du, H.; Liu, Y.; Niyato, D.; Kang, J.; Sun, S.; Shen, X.; Poor, H.V. Interactive AI with Retrieval-Augmented Generation for Next Generation Networking. IEEE Netw. 2024, 38, 414–424. [Google Scholar] [CrossRef]
  6. Cui, Z.; Zhao, Y.; Cao, Y.; Cai, X.; Zhang, W.; Chen, J. Malicious code detection under 5G HetNets based on a multi-objective RBM model. IEEE Netw. 2021, 35, 82–87. [Google Scholar] [CrossRef]
  7. Wang, J.; Yan, Z.; Wang, H.; Li, T.; Pedrycz, W. A survey on trust models in heterogeneous networks. IEEE Commun. Surv. Tutor. 2022, 24, 2127–2162. [Google Scholar] [CrossRef]
  8. Zhang, T.; Kong, F.; Deng, D.; Tang, X.; Wu, X.; Xu, C.; Zhu, L.; Liu, J.; Ai, B.; Han, Z.; et al. Moving Target Defense Meets Artificial Intelligence-Driven Network: A Comprehensive Survey. IEEE Internet Things J. 2025, 1. [Google Scholar] [CrossRef]
  9. Dey, M.R.; Patra, M.; Mishra, P. Efficient detection and localization of dos attacks in heterogeneous vehicular networks. IEEE Trans. Veh. Technol. 2023, 72, 5597–5611. [Google Scholar] [CrossRef]
  10. Wang, X.; Zhang, X.; Wang, S.; Xiao, J.; Tao, X. Modeling, Critical Threshold, and Lowest-Cost Patching Strategy of Malware Propagation in Heterogeneous IoT Networks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 3531–3545. [Google Scholar] [CrossRef]
  11. Sharma, H.; Kumar, N.; Tekchandani, R. Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach. IEEE Trans. Veh. Technol. 2022, 72, 2439–2452. [Google Scholar] [CrossRef]
  12. Tang, X.; Shen, M.; Li, Q.; Zhu, L.; Xue, T.; Qu, Q. Pile: Robust privacy-preserving federated learning via verifiable perturbations. IEEE Trans. Dependable Secur. Comput. 2023, 20, 5005–5023. [Google Scholar] [CrossRef]
  13. Zhang, T.; Xu, C.; Lian, Y.; Tian, H.; Kang, J.; Kuang, X.; Niyato, D. When moving target defense meets attack prediction in digital twins: A convolutional and hierarchical reinforcement learning approach. IEEE J. Sel. Areas Commun. 2023, 41, 3293–3305. [Google Scholar] [CrossRef]
  14. Zhang, T.; Xu, C.; Zou, P.; Tian, H.; Kuang, X.; Yang, S.; Zhong, L.; Niyato, D. How to mitigate DDoS intelligently in SD-IoV: A moving target defense approach. IEEE Trans. Ind. Inform. 2022, 19, 1097–1106. [Google Scholar] [CrossRef]
  15. Zhu, X.; Liu, J.; Lu, L.; Zhang, T.; Qiu, T.; Wang, C.; Liu, Y. Enabling intelligent connectivity: A survey of secure isac in 6g networks. IEEE Commun. Surv. Tutor. 2024. [Google Scholar] [CrossRef]
  16. Zhang, W.; He, Y.; Zhang, T.; Ying, C.; Kang, J. Intelligent Resource Adaptation for Diversified Service Requirements in Industrial IoT. IEEE Trans. Cogn. Commun. Netw. 2024. [Google Scholar] [CrossRef]
  17. Zhang, T.; Xu, C.; Shen, J.; Kuang, X.; Grieco, L.A. How to disturb network reconnaissance: A moving target defense approach based on deep reinforcement learning. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5735–5748. [Google Scholar] [CrossRef]
  18. Seow, J.W.; Lim, M.K.; Phan, R.C.; Liu, J.K. A comprehensive overview of Deepfake: Generation, detection, datasets, and opportunities. Neurocomputing 2022, 513, 351–371. [Google Scholar] [CrossRef]
  19. Li, L.; Xu, W.; Gao, Y.; Lu, Y.; Yang, D.; Liu, R.W.; Zhang, R. Attention-oriented residual block for real-time low-light image enhancement in smart ports. Comput. Electr. Eng. 2024, 120, 109634. [Google Scholar] [CrossRef]
  20. Krishnamurthy, D.; Uckun, C.; Zhou, Z.; Thimmapuram, P.R.; Botterud, A. Energy storage arbitrage under day-ahead and real-time price uncertainty. IEEE Trans. Power Syst. 2017, 33, 84–93. [Google Scholar] [CrossRef]
  21. Wang, X.; Liu, J. A novel feature integration and entity boundary detection for named entity recognition in cybersecurity. Knowl.-Based Syst. 2023, 260, 110114. [Google Scholar] [CrossRef]
  22. Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Kumar, N. P2SF-IoV: A privacy-preservation-based secured framework for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 23, 22571–22582. [Google Scholar] [CrossRef]
  23. Manias, D.M.; Shami, A. Making a case for federated learning in the internet of vehicles and intelligent transportation systems. IEEE Netw. 2021, 35, 88–94. [Google Scholar] [CrossRef]
  24. Chellapandi, V.P.; Yuan, L.; Brinton, C.G.; Żak, S.H.; Wang, Z. Federated learning for connected and automated vehicles: A survey of existing approaches and challenges. IEEE Trans. Intell. Veh. 2023, 9, 119–137. [Google Scholar] [CrossRef]
  25. Huang, W.; Wang, D.; Ouyang, X.; Wan, J.; Liu, J.; Li, T. Multimodal federated learning: Concept, methods, applications and future directions. Inf. Fusion 2024, 112, 102576. [Google Scholar] [CrossRef]
  26. Ma, X.; Jiang, Q.; Shojafar, M.; Alazab, M.; Kumar, S.; Kumari, S. Disbezant: Secure and robust federated learning against byzantine attack in iot-enabled mts. IEEE Trans. Intell. Transp. Syst. 2022, 24, 2492–2502. [Google Scholar] [CrossRef]
  27. Chen, M.; Shlezinger, N.; Poor, H.V.; Eldar, Y.C.; Cui, S. Communication-efficient federated learning. Proc. Natl. Acad. Sci. USA 2021, 118, e2024789118. [Google Scholar] [CrossRef] [PubMed]
  28. Ranaweera, P.; Jurcut, A.D.; Liyanage, M. Survey on multi-access edge computing security and privacy. IEEE Commun. Surv. Tutorials 2021, 23, 1078–1124. [Google Scholar] [CrossRef]
  29. Singh, A.; Chatterjee, K. Securing smart healthcare system with edge computing. Comput. Secur. 2021, 108, 102353. [Google Scholar] [CrossRef]
  30. Xue, H.; Chen, D.; Zhang, N.; Dai, H.N.; Yu, K. Integration of blockchain and edge computing in internet of things: A survey. Future Gener. Comput. Syst. 2023, 144, 307–326. [Google Scholar] [CrossRef]
  31. Garg, S.; Kaur, K.; Kaddoum, G.; Garigipati, P.; Aujla, G.S. Security in IoT-driven mobile edge computing: New paradigms, challenges, and opportunities. IEEE Netw. 2021, 35, 298–305. [Google Scholar] [CrossRef]
  32. Su, X.; Xue, S.; Liu, F.; Wu, J.; Yang, J.; Zhou, C.; Hu, W.; Paris, C.; Nepal, S.; Jin, D.; et al. A comprehensive survey on community detection with deep learning. IEEE Trans. Neural Netw. Learn. Syst. 2022, 35, 4682–4702. [Google Scholar] [CrossRef] [PubMed]
  33. Xu, W.; Xiao, P.; Zhu, L.; Zhang, Y.; Chang, J.; Zhu, R.; Xu, Y. Classification and rating of steel scrap using deep learning. Eng. Appl. Artif. Intell. 2023, 123, 106241. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, T.; Tang, X.; Wang, J.; Liu, J. Network Security Management in Heterogeneous Networks. Electronics 2025, 14, 568. https://doi.org/10.3390/electronics14030568

AMA Style

Zhang T, Tang X, Wang J, Liu J. Network Security Management in Heterogeneous Networks. Electronics. 2025; 14(3):568. https://doi.org/10.3390/electronics14030568

Chicago/Turabian Style

Zhang, Tao, Xiangyun Tang, Jiacheng Wang, and Jiqiang Liu. 2025. "Network Security Management in Heterogeneous Networks" Electronics 14, no. 3: 568. https://doi.org/10.3390/electronics14030568

APA Style

Zhang, T., Tang, X., Wang, J., & Liu, J. (2025). Network Security Management in Heterogeneous Networks. Electronics, 14(3), 568. https://doi.org/10.3390/electronics14030568

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop