样式: 排序: IF: - GO 导出 标记为已读
-
Securing SDN: Hybrid autoencoder-random forest for intrusion detection and attack mitigation J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-15 Lotfi Mhamdi, Mohd Mat Isa
Software Defined Networking (SDN) has revolutionized network administration by providing centralized management through software, enabling traffic adjustment independent of the data plane. Despite the benefits, SDN networks are prone to security threats from external sources, thus necessitating the implementation of security measures. Unfortunately, most existing efforts have been just a simple mapping
-
ELA-RCP: An energy-efficient and load balanced algorithm for reliable controller placement in software-defined networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-04 Maedeh Abedini Bagha, Kambiz Majidzadeh, Mohammad Masdari, Yousef Farhang
Software-defined networking is a modern and popular network technology that utilizes controllers as network operating systems to manage the network and allow user applications to interact with network hardware. Determining the optimal number of controllers and the optimal place to install them are some of the multi-controller model challenges that are known as the Controller Placement Problem (CPP)
-
Throughput and delay analysis of cognitive M2M communications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-02 Soumen Mondal, Luca Davoli, Sanjay Dhar Roy, Sumit Kundu, Gianluigi Ferrari, Riccardo Raheli
In this paper, we analyze throughput and delay performance of clustered Machine Type Communication (MTC) devices which access an eNodeB utilizing a primary spectrum in underlay mode. We assume that the MTC devices form two clusters and there is an optimal preamble allocation between the two clusters to maximize the throughput. We further investigate the impact of the tolerable interference threshold
-
Discrete-time Markov decision process for performance analysis of virtual machine allocation schemes in C-RAN J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-02 Sana Younes, Maroua Idi, Riadh Robbana
Cloud Radio Access Network (C-RAN) has been proposed as a cloud architecture to provide a common connected resource pool management. It separates the functionalities of the traditional Base Station (BS) into two parts: the Base Band Unit (BBU) and the Remote Radio Head (RRH). BBUs functions are implemented on the Virtual Machines (VMs) in the cloud over commodity hardware, serving User Equipments (UEs)
-
AI-enhanced blockchain technology: A review of advancements and opportunities J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-01 Dalila Ressi, Riccardo Romanello, Carla Piazza, Sabina Rossi
Blockchain technology has rapidly gained popularity, permeating various fields due to its inherent features of security, transparency, and decentralization. Blockchain-based applications, spanning from financial transactions to supply chain management, have revolutionized numerous industries. Concurrently, Artificial Intelligence (AI) techniques have emerged as a powerful tool for efficiently solving
-
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-03-01 Alessandra Somma, Alessandra De Benedictis, Christiancarmine Esposito, Nicola Mazzocca
In recent years, the emerging Digital Twin (DT) technology is playing a key role in fostering the transition towards the Industry 4.0. DTs, representing virtual replicas of physical objects, products or processes established thanks to a bidirectional continuous flow of information between the physical and the virtual world, are currently adopted in multiple domains such as manufacturing, aerospace
-
ActiveGuardian: An accurate and efficient algorithm for identifying active elephant flows in network traffic J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-24 Bing Xiong, Yongqing Liu, Rui Liu, Jinyuan Zhao, Shiming He, Baokang Zhao, Kun Yang, Keqin Li
Active elephant flows, which indicate the real-time data transmission status, are of primary interest in network management and various applications. However, existing network measurement efforts mainly focus on finding elephant flows, and limited works on identifying active elephant flows suffer from low accuracy and heavy overheads. To address this issue, this paper proposes ActiveGuardian to identify
-
A survey on intelligent management of alerts and incidents in IT services J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-20 Qingyang Yu, Nengwen Zhao, Mingjie Li, Zeyan Li, Honglin Wang, Wenchi Zhang, Kaixin Sui, Dan Pei
Modern service systems are constantly improving with the development of various IT technologies, leading to a boost in system scales and complex dependencies among service components. The large scale and complexity of services make them more prone to failure. To maintain services’ normal and stable operation, alert and incident management (AIM), which analyzes and handles service failures in time,
-
Hardening of network segmentation using automated referential penetration testing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-20 Mohammed Alabbad, Neerja Mhaskar, Ridha Khedri
We study the problem of hardening the security of existing networks. Dynamic and static analysis are two main approaches that are used to address this problem. Dynamic analysis is performed using penetration testing. Penetration testing (short pentesting) simulates attacks on an existing and possibly dynamic network to identify its vulnerabilities without causing it any harm. Static analysis analyzes
-
Firm social management system for supporting IoT users in application environment J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-08 Ying Huang
Internet of Things (IoT) applications connect various services and communication channels to support social user interaction. User management impedes the smooth operation of these networked services by causing interference and delayed responses. The suggested FMS provides a solution by resolving connection- and interference-related problems brought on by application switchovers and social effects.
-
-
Novel blockchain-assisted fault-tolerant roaming authentication protocol for mobility networks without home agent entanglement J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-05 Hadi Ghaemi, Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Zakieh Alizadehsani
In mobility networks, users can receive desired services from foreign agents securely by means of a roaming authentication protocol. During the past decade, scholars have attempted to propose efficient and secure protocols. Nevertheless, careful observation of related works demonstrates that previously-proposed protocols have the following limitations. First, the home agent involvement is required
-
Evaluation of distributed data processing frameworks in hybrid clouds J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-03 Faheem Ullah, Shagun Dhingra, Xiaoyu Xia, M. Ali Babar
Distributed data processing frameworks (e.g., Hadoop, Spark, and Flink) are widely used to distribute data among computing nodes of a cloud. Recently, there have been increasing efforts aimed at evaluating the performance of distributed data processing frameworks hosted in private and public clouds. However, there is a paucity of research on evaluating the performance of these frameworks hosted in
-
HD-FUZZ: Hardware dependency-aware firmware fuzzing via hybrid MMIO modeling J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-01 Juhwan Kim, Jihyeon Yu, Youngwoo Lee, Dan Dongseong Kim, Joobeom Yun
Numerous interconnected small embedded systems, such as Internet of Things (IoT) devices, are pervasive in our daily lives; however, their security lags behind. In particular, firmware vulnerabilities in low-level infrastructure have a more severe impact than application-level vulnerabilities. Fuzzing is the most effective technique for detecting vulnerabilities in firmware, but it encounters several
-
Detection of quality of service degradation on multi-tenant containerized services J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-01 Pedro Horchulhack, Eduardo K. Viegas, Altair O. Santin, Felipe V. Ramos, Pietro Tedeschi
Computational services are progressively migrating to container-based solutions due to their faster provision time and lower resource allocation overhead. Service providers rely on container multi-tenancy to share their computing infrastructure and pave their way to profit. Yet, the Quality of Service (QoS) impact due to container multi-tenancy on deployed services is still widely overlooked in the
-
Energy optimized data fusion approach for scalable wireless sensor network using deep learning-based scheme J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-02-01 Tariq Mahmood, Jianqiang Li, Tanzila Saba, Amjad Rehman, Saqib Ali
-
A service function chain mapping scheme based on functional aggregation in space-air-ground integrated networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-30 Peiying Zhang, Kunkun Yan, Neeraj Kumar, Lizhuang Tan, Mohsen Guizani, Konstantin Igorevich Kostromitin, Jian Wang, Jianyong Zhang
Being a novel network architecture, the Space-air-ground integrated network (SAGIN) offers advantages such as extensive network coverage and seamless ubiquitous access. However, it also encounters the challenge of balancing a growing user demand with limited network service resources. In order to further improve the utilization rate of network resources, a group of virtual network functions can be
-
Exploring Blockchain-driven security in SDN-based IoT networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-29 Ngangbam Indrason, Goutam Saha
The Internet of Things (IoT) is an emerging field of technology with a huge scope of its applicability in various industries and a wide range of societal needs, including medical sciences. However, IoT suffers from many limitations like energy, resource constraints, scalability, security, availability, etc. Software-Defined Networking (SDN) is another similar technology that has many features that
-
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-26 Tao Peng, Wei You, Kejian Guan, Entao Luo, Shaobo Zhang, Guojun Wang, Tian Wang, Youke Wu
The Mobile crowdsensing (MCS) platforms perform optimal task assignments by collecting a large amount of user information to improve system performance and efficiency. However, the collection and analysis of users’ data may jeopardize their privacy. Existing privacy protection methods of task assignment have rarely considered the comprehensive protection of user privacy and focus primarily on single
-
Optimized blockchain-based healthcare framework empowered by mixed multi-agent reinforcement learning J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-26 Abeer Z. Al-Marridi, Amr Mohamed, Aiman Erbad
The world has recently witnessed the devastating impact of a global pandemic, where countless lives were tragically lost due to delayed abnormal disease detection and the lack of seamless coordination among healthcare organizations such as hospitals, medical labs, and pharmacies. Addressing the heterogeneity of healthcare entities and the extensive volume of medical-related data they possess gives
-
Early Prevention and Mitigation of Link Flooding Attacks in Software Defined Networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-26 Shariq Murtuza, Krishna Asawa
Software-Defined Networks (SDNs) are increasingly gaining prominence in the networking domain, enabling programmable control and management of network infrastructure within data centers. This programmability offers the advantage of dynamically adjusting the routing paths depending upon on the network’s requirements and capabilities. Computer networks have been vulnerable to denial of service attacks
-
Development of a provably secure and privacy-preserving lightweight authentication scheme for roaming services in global mobility network J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-24 Dipanwita Sadhukhan, Sangram Ray, Mou Dasgupta, Muhammad Khurram Khan
The accelerated development of Internet of Things services surfaced the way for providing uninterrupted and adaptable smart mobility services for mobile clients to communicate without any zone or time constraints. The global mobility network is an appropriate contender to be adopted as a communication platform to offer roaming services for swift data exchange and fast movement of mobile users in smart
-
RL-based HTTP adaptive streaming with edge collaboration in multi-client environment J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-22 Jeongho Kang, Kwangsue Chung
Hypertext Transfer Protocol (HTTP) adaptive streaming aims to achieve high Quality of Experience (QoE) in video streaming. However, when multiple clients stream videos, QoE fairness and overall QoE deteriorate due to the lack of consideration for multi-client environments and dynamically changing network environments. This paper proposes HTTP adaptive streaming based on edge collaboration using Reinforcement
-
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-20 Ali Y. Aldailamy, Abdullah Muhammed, Rohaya Latip, Nor Asilah Wati Abdul Hamid, Waidah Ismail
In social media, a huge number of worldwide data objects are posted every day. The contents of these data objects include text, links, images, audio, and videos which could be small, medium, or large and accessed across the world. Moving these data objects into a single cloud service provider (CSP) is risky and results in four-fold obstacles: vendor lock-in, service availability, cost-ineffective use
-
5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-19 Muhammad Adil, Houbing Song, Muhammad Khurram Khan, Ahmed Farouk, Zhanpeng Jin
Internet technology has proven to be a vital contributor to many cutting-edge innovations that have given humans access to interact virtually with objects. Until now, numerous virtual systems had been developed for digital transformation to enable access to thousands of services and applications that range from virtual gaming to social networks. However, the majority of these systems lack to maintain
-
Compressive sensing of Internet traffic data using relative-error bound tensor-CUR decomposition J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-18 Awnish Kumar, Vijaya V. Saradhi, Venkatesh Tamarapalli
Missing values in the Internet traffic data pose a serious challenge for use in several traffic engineering applications. Compressive sensing is a generic methodology for the reconstruction of missing values in the tensor representation of the data. Existing decomposition techniques for compressive sensing suffer from two limitations; need to know the tensor rank apriori and the usage of alternating
-
mPillBox: An open framework for a smarter pillbox J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-18 Naser AlDuaij
As the medical and technological fields have improved, there is a growing reliance on technology in the medical field. A considerable issue plaguing patients around the world is the management of medication intake for medications that treat chronic or otherwise serious illnesses. As such, many hospitalizations or even deaths are caused by medication errors. Existing solutions that provide smart pillboxes
-
Time-continuous computing offloading algorithm with user fairness guarantee J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-18 Hao Hao, Wei Ding, Wei Zhang
Computing offloading is a potential avenue to reduce transmission delay by moving computing tasks from cloud to edge nodes. Due to the limited computing capacity of edge nodes, performing effective computing offloading strategy is challenging. To simplify the problem, it is often assumed that the timeline is discrete and offloading decisions are only made at the end of each time slot. However, the
-
Optimizing efficiency of P2P content distribution with network coding: Principles, challenges, and future directions J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2024-01-11 Omar Lajam, Salahadin Mohammed
Network coding technology has opened new avenues for enhancing networking applications. Peer-to-peer (P2P) content distribution stands as a particularly promising application domain where network coding can effectively reduce network load and transmission time. However, the additional complexity introduced by coding operations raises questions about the trade-offs and overall cost–benefit analysis
-
TridentShell: An enhanced covert and scalable backdoor injection attack on web applications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-30 Xiaobo Yu, Weizhi Meng, Yining Liu, Fei Zhou
Web backdoor attack is an increasingly prevalent network attack that can result in substantial losses for webmasters. During a cyber-attack, system vulnerabilities and web application flaws are usually used to implant a web shell inside victim servers. To mitigate these threats posed by web shells, research has focused on static feature detection, which has been evolved rapidly in recent years. However
-
BLIND: A privacy preserving truth discovery system for mobile crowdsensing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-18 Vincenzo Agate, Pierluca Ferraro, Giuseppe Lo Re, Sajal K. Das
Nowadays, an increasing number of applications exploit users who act as intelligent sensors and can quickly provide high-level information. These users generate valuable data that, if mishandled, could potentially reveal sensitive information. Protecting user privacy is thus of paramount importance for crowdsensing systems. In this paper, we propose BLIND, an innovative open-source truth discovery
-
HiMAQ: Hierarchical multi-agent Q-learning-based throughput and fairness improvement for UAV-Aided IoT networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-22 Eunjin Kim, Junsu Kim, Jae-Hyun Kim, Howon Lee
Recently, various types of Internet of Things (IoT) services have become wide spread, and new types of IoT devices are emerging. However, the significant number of high-rise buildings in urban environments renders it difficult to provide seamless and high-speed network connectivity consistently to these IoT devices via existing terrestrial IoT networks. Therefore, we herein consider unmanned aerial
-
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-22 Ming Zhou, Zhen Yang, Haiyang Yu, Shui Yu
Decentralized federated learning tries to address the single point of failure and privacy issue of federated learning by leveraging committee-based blockchain, which has been extensively studied among academic and industrial fields. The introduction of committees improves the efficiency of decentralized federated learning. However, it also is prone to attacks from Byzantine committee members, which
-
Harnessing federated generative learning for green and sustainable Internet of Things J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-09 Yuanhang Qi, M. Shamim Hossain
The rapid proliferation of devices in the Internet of Things (IoT) has ushered in a transformative era of data-driven connectivity across various domains. However, this exponential growth has raised pressing concerns about environmental sustainability and data privacy. In response to these challenges, this paper introduces One-shot Federated Learning (OSFL), an innovative paradigm that harmonizes sustainability
-
Advances in fronthauling of communication technologies: A review J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-07 Harpreet Kaur, Simranjit Singh, Ranjit Kaur, Rajandeep Singh
A detailed review of cellular generations is done with respect to fronthauling (FH) with the existing and upcoming key communication technologies. The journey of FH from migration to functional split as per the requirements of 5G and beyond is detailed with the standardized communication network technologies. In concern to efficient utilization of frequency spectrum; cost and time, the millimeter-wave
-
Towards defining industry 5.0 vision with intelligent and softwarized wireless network architectures and services: A survey J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-06 Shah Zeb, Aamir Mahmood, Sunder Ali Khowaja, Kapal Dev, Syed Ali Hassan, Mikael Gidlund, Paolo Bellavista
Industry 5.0 vision, a step toward the next industrial revolution and enhancement to Industry 4.0, conceives the new goals of resilient, sustainable, and human-centric approaches in diverse emerging applications such as factories-of-the-future and digital society. The vision seeks to leverage human intelligence and creativity in nexus with intelligent, efficient, and reliable cognitive collaborating
-
Surgical immunization strategies against lateral movement in Active Directory environments J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-06 David Herranz-Oliveros, Ivan Marsa-Maestre, Jose Manuel Gimenez-Guzman, Marino Tejedor-Romero, Enrique de la Hoz
Lateral movement, in which a cyber attacker progresses through an enterprise network in order to compromise its most valuable assets, is a key stage of any intrusion nowadays. Therefore, being able to mitigate lateral movement, be it by slowing down attacker progress or by limiting its reach, is a top priority for enterprise cyber-defence. Due to the inherent complexity of enterprise networks, it is
-
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-04 Muna Al-Hawawreh, Mamoun Alazab, Mohamed Amine Ferrag, M. Shamim Hossain
Due to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which include heterogeneous devices, legacy and new connectivity protocols and systems, and distributed networks, sophisticated attacks like ransomware will likely target these systems in the near future. Researchers have focused on studying and addressing ransomware attacks against various platforms in recent years
-
Overcoming cold start and sensor bias: A deep learning-based framework for IoT-enabled monitoring applications J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-03 Mohammed Shurrab, Dunia Mahboobeh, Rabeb Mizouni, Shakti Singh, Hadi Otrok
Target localization is an essential aspect of smart environmental monitoring, which has gained prominence thanks to the Internet of Things (IoT) paradigm. Localization is the process of determining the location of an unknown target within an area of interest (AoI) based on data gathered by IoT sensors. Existing target localization works assume full knowledge about the sensors without considering the
-
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-12-01 Hongwei Zhang, Wei Fan, Jinsong Wang
With the rapid development of information technology and the increasing popularity of personalized services, the flow of users’ personal information in the Internet is inevitable between different platforms and applications, which greatly affects the trust relationship in the digital society. In recent years, an increasing number of researchers have been dedicated to exploring the applications of blockchain
-
Network shortcut in data plane of service mesh with eBPF J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-30 Wanqi Yang, Pengfei Chen, Guangba Yu, Haibin Zhang, Huxing Zhang
In recent years, the adoption of the service mesh as a dedicated infrastructure layer to support cloud-native systems has gained significant popularity. Service meshes involve the incorporation of proxies to handle communication between microservices, thereby speeding up the development and deployment of microservice applications. However, the use of service meshes also increases the request latency
-
Using FlowVisor and evolutionary algorithms to improve the switch migration in SDN J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-30 Ali El Kamel
The switch migration (SM) issue has been widely addressed in distributed Software Defined Networks (SDN). Most of researches have focused on achieving SM with balanced loads among controllers but little efforts are devoted to equilibrate the service offered to switches when limited resources in control plane are experienced. This paper deals with the problem of dynamic switch migration in multi-controller
-
TRACE: Transformer-based continuous tracking framework using IoT and MCS J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-27 Shahmir Khan Mohammed, Shakti Singh, Rabeb Mizouni, Hadi Otrok
Target tracking, a critical application in the Internet of Things (IoT) and Mobile Crowd Sensing (MCS) domains, is a complex task that involves the continuous estimation of the positions of an object by using efficient and accurate algorithms. Some potential applications of target tracking include surveillance systems, asset tracking, wildlife monitoring, and cross-border security. The existing target
-
An online bi-objective scheduling algorithm for service provisioning in cloud computing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-28 Yuxiao Qi, Li Pan, Shijun Liu
To reduce costs and risks, service providers can purchase Infrastructure-as-a-Service (IaaS) instances from public clouds to deploy service applications and deliver job-execution services to users. However, it is challenging to make optimal instance purchasing and job scheduling decisions due to diverse instance billing methods and random service demands. In order to minimize time average service costs
-
A flexible algorithm to offload DAG applications for edge computing J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-19 Gabriel F.C. de Queiroz, José F. de Rezende, Valmir C. Barbosa
Multi-access Edge Computing (MEC) is an enabling technology to leverage new network applications, such as virtual/augmented reality, by providing faster task processing at the network edge. This is done by deploying servers closer to the end users to run the network applications. These applications are often intensive in terms of task processing, memory usage, and communication; thus mobile devices
-
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-13 Shahid Latif, Wadii Boulila, Anis Koubaa, Zhuo Zou, Jawad Ahmad
In the dynamic field of the Industrial Internet of Things (IIoT), the networks are increasingly vulnerable to a diverse range of cyberattacks. This vulnerability necessitates the development of advanced intrusion detection systems (IDSs). Addressing this need, our research contributes to the existing cybersecurity literature by introducing an optimized Intrusion Detection System based on Deep Transfer
-
RAaaS: Resource Allocation as a Service in multiple cloud providers J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-14 Cristiano Costa Argemon Vieira, Luiz Fernando Bittencourt, Thiago Augusto Lopes Genez, Maycon Leone M. Peixoto, Edmundo Roberto Mauro Madeira
Cloud users require a set of specific computing needs for their applications, while cloud providers offer a variety of computing products and services on the Internet. These two cloud players make deals through the use of service level agreements (SLAs) where, for instance, prices and levels of quality of service (QoS) are defined. From the cloud user’s point of view, building a robust set of SLAs
-
Region-aware dynamic job scheduling and resource efficiency for load balancing based on adaptive chaotic sparrow search optimization and coalitional game in cloud computing environments J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-08 Mustafa Ibrahim Khaleel
Uneven distribution of workloads represents a significant challenge in cloud data centers, negatively impacting the efficient utilization of resources. To address this problem and optimize the performance-to-profit (PP) ratio, we introduced the Regional Awareness dynamic Scheduling Algorithm (RASA) through a three-phase approach. In the initial phase, tasks are categorized based on critical parameters
-
Using deep reinforcement learning to train and periodically re-train a data-collecting drone based on real-life measurements J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-08 Shie-Yuan Wang, Cheng-Da Lin
In a smart city, many different kinds of smart meters (i.e., IoT devices) are used to help govern the city and their data need to be periodically collected for billing or analytics purposes. In our previous work (Wang et al., 2021), we designed and implemented a drone-based wake-up and data collection system for smart meters by using wake-up radios (WuR) and WiFi. Using this system, in this work we
-
An enhanced node segmentation and distance estimation scheme with a reduced search space boundary and improved PSO for obstacle-aware wireless sensor network localization J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-10 Songyut Phoemphon, Nutthanon Leelathakul, Chakchai So-In
This paper proposes an enhanced method for localizing sensor nodes in wireless sensor networks with obstacles. Such environment settings lead to lower localization accuracy because locations are estimated based on detour distances circumventing the obstacles; we, therefore, improve the segmentation technique to address the issue as they divide the whole area into multiple smaller ones, each containing
-
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-10 Zihang Zhen, Xiaoding Wang, Hui Lin, Sahil Garg, Prabhat Kumar, M. Shamim Hossain
Currently, the crowdsourcing system has serious problems such as single point of failure of the server, leakage of user privacy, unfair arbitration, etc. By storing the interactions between workers, requesters, and crowdsourcing platforms in the form of transactions on the blockchain, these problems can be effectively addressed. However, the improvement in total computing power on the blockchain is
-
quicSDN: Transitioning from TCP to QUIC for southbound communication in software-defined networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-10 Puneet Kumar, Behnam Dezfouli
In Software-Defined Networks (SDNs), the control plane and data plane communicate for various purposes such as applying configurations and collecting statistical data. While various methods have been proposed to reduce the overhead and enhance the scalability of SDNs, the impact of the transport layer protocol used for southbound communication has not been investigated. Existing SDNs rely on Transmission
-
STOP: Joint send buffer and transmission control for user-perceived deadline guarantee via curriculum guided-deep reinforcement learning J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-07 Rongji Liao, Yuan Zhang, Jinyao Yan, Yang Cai, Narisu Tao
Real-time applications with strict user-perceived deadline requirements, such as cloud virtual reality (VR) gaming and high-frequency trading, have experienced substantial growth in recent years. To ensure the user-perceived deadline at the transport layer, i.e., the network transmission delay and the waiting delay in the send buffer, transmission control scheme plays an important role. While several
-
Semi-supervised, Neural Network based approaches to face mask and anomaly detection in surveillance networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-07 Sabir Saheel, Anik Alvi, Aninda Roy Ani, Tarem Ahmed, Mohammad Faisal Uddin
In the post-pandemic world, surveillance cameras play a key aspect when it comes to detecting various kinds of security risks. These can range from burglars entering a premises to an individual wearing or not wearing a mask where convention dictates one way versus the other. We are proposing a system that would allow the autonomous detection of these security risks with minimal human intervention.
-
Security attacks in Opportunistic Mobile Networks: A systematic literature review J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-04 Ala Altaweel, Sidra Aslam, Ibrahim Kamel
Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks (DTNs), refer to wireless networks in which the mobile nodes (e.g., smartphones, tablets, notebooks, laptops) are intermittently and opportunistically connected (when the nodes encounter each other). The opportunistic connectivity of the nodes and their ability to join/leave at anytime makes OMNs/DTNs exposed to different kinds
-
Multipoint communication using a fog-robotic coordinated nodal conveying system for wireless networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-11-02 S. Periyanayagi, S.P. Raja, S. Vairachilai
Fog computing is a framework that makes use of the features of both cloud and edge devices to provide quality services, support mobility, reduce delay & latency, and to provide other services to the recent technologies. The fog computing is incorporated in wireless networks using coordinated multi-point communication, which helps to in sending raw bits over a physical link that connects network swarm
-
Dynamic resource management in integrated NOMA terrestrial–satellite networks using multi-agent reinforcement learning J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-10-30 Ali Nauman, Haya Mesfer Alshahrani, Nadhem Nemri, Kamal M. Othman, Nojood O. Aljehane, Mashael Maashi, Ashit Kumar Dutta, Mohammed Assiri, Wali Ullah Khan
The integration of terrestrial and satellite wireless communication networks offers a practical solution to enhance network coverage, connectivity, and cost-effectiveness. Moreover, in today’s interconnected world, connectivity’s reliable and widespread availability is increasingly important across various domains. This is especially more crucial for applications like the Internet of Things (IoT),
-
Node cardinality estimation in a heterogeneous wireless network deployed over a large region using a mobile base station J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-10-28 Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar
We consider the problem of estimation of the node cardinality of each node type in a heterogeneous wireless network with T types of nodes deployed over a large region, where T≥2 is an integer. A mobile base station (MBS), such as that mounted on an unmanned aerial vehicle, is used in such cases since a single static base station is not sufficient to cover such a large region. The MBS moves around in
-
End-to-end active queue management with Named-Data Networking J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-10-24 Miguel Rodríguez-Pérez, Sergio Herrería-Alonso, J. Carlos López-Ardao, Raúl F. Rodríguez-Rubio
The innovative information-based Named-Data Networking (NDN) architecture provides a good opportunity to rethink many of the design decisions that are taken for granted in the Internet today. For example, active queue management (AQM) tasks have been traditionally implemented in the routers to alleviate network congestion before their buffers fill up. However, AQM operations could be performed on an
-
A hybrid analytical concept to QoE index evaluation: Enhancing eMBB service detection in 5G SA networks J. Netw. Comput. Appl. (IF 8.7) Pub Date : 2023-10-21 Jean Nestor M. Dahj, Kingsley A. Ogudo, Leandro Boonzaaier