
显示样式: 排序: IF: - GO 导出
-
A scalable private Bitcoin payment channel network with privacy guarantees J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-18 Enes Erdin; Mumin Cebe; Kemal Akkaya; Eyuphan Bulut; Selcuk Uluagac
While Bitcoin heavily dominates the cryptocurrency markets, its use in micropayments is still a challenge due to long transaction confirmation times and high fees. Recently, the concept of off-chain transactions is introduced that led to the idea of establishing a payment channel network called Lightning Network (LN), which utilizes multi-hop payments. Off-chain links provide the ability to make instant
-
Temporary immutability: A removable blockchain solution for prosumer-side energy trading J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-19 Ali Dorri; Fengji Luo; Samuel Karumba; Salil Kanhere; Raja Jurdak; Zhao Yang Dong
Recently, blockchain adoption in prosumer-side energy trading has been actively studied. However, most of the conventional frameworks permanently store all transactions which increases blockchain management cost and reduces the user privacy. Additionally, most of the existing solutions focus on facilitating energy trading and negotiation, while ignoring two critical issues: data acquisition and contract
-
New signal location method based on signal-range data for proximity tracing tools J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-20 Aleksandro Montanha; Airton M. Polidorio; María del Carmen Romero-Ternero
Several technological solutions have emerged over the last several months to support proximity contact tracing to fight the COVID-19 pandemic. For this reason, today more than ever, accurate signal location is needed, even in indoor public areas (supermarkets, public transport, etc.). In a previous work, we proposed five methods to solve the problem of signal localization using elements of pole-polar
-
A distributed deployment algorithm for communication coverage in wireless robotic networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-17 Xiaojie Liu; Xingwei Wang; Jie Jia; Min Huang
Wireless Robotic Networks (WRNs), composed of numerous mobile robotic agents with the ability of moving, computing, sensing, and communicating, are able to provide wireless communication services and thus implement complicated tasks for user equipments. In order to guarantee the performance of coverage rate and ensure providing the services timely and effectively, mobile robotics in WRNs are usually
-
A two-phase virtual machine placement policy for data-intensive applications in cloud J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-17 Samaneh Sadegh; Kamran Zamanifar; Piotr Kasprzak; Ramin Yahyapour
Cloud computing and big data are two technologies whose combination can yield many benefits and challenges. One of the most significant challenges is the traffic produced by data-intensive jobs within a data center. A possible way to manage the produced traffic is optimizing the placement of virtual machines (VM) on hosts. However, placing VMs compactly to reduce the communication cost can negatively
-
Context-aware scheduling in Fog computing: A survey, taxonomy, challenges and future directions J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-11 Mir Salim Ul Islam; Ashok Kumar; Yu-Chen Hu
Fog computing extends Cloud-based facilities and stays in the vicinity of the end-users to provide an attractive solution to a diverse range of latency-sensitive applications. The applications are becoming more sophisticated, context-aware, and computation-intensive due to varying situational and environmental conditions in order to meet the ever-increasing users’ demands. Further, resource heterogeneity
-
Cost-aware automatic scaling and workload-aware replica management for edge-cloud environment J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-17 Chunlin Li; Jun Liu; Bo Lu; Youlong Luo
As the mobile edge computing develops continually, many emerging and diversified edge applications, such as Internet of vehicles, virtual reality games and lightweight deep learning tasks, are emerged. These applications are latency sensitive and require a large number of network connections. As the data size and business requests processed per unit of time continue to increase, the pressure of edge
-
A hierarchical approach for accelerating IoT data management process based on SDN principles J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-22 Zahra Eghbali; Mina Zolfy Lighvan
The human life is changing drastically due to a popular emerging technology called Internet of things (IoT). The growth in the number of devices connecting to IoT networks results in large volumes of data collected or generated by these devices. Since IoT data is different from other types of data in terms of diversity and rapid growth and due to the huge amount of the generated data, the complexity
-
A heuristic scheduling approach for fog-cloud computing environment with stationary IoT devices J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-04 Raafat O. Aburukba; Taha Landolsi; Dalia Omer
The emergence of the Internet of Things (IoT) paradigm has led to the rise of a variety of applications with different characteristics and Quality of Service (QoS) requirements. Those applications require computational power and have time sensitive requirements. Cloud computing paradigm provides an illusion to consumers with unlimited computation resource power. However, cloud computing fails to deliver
-
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-04 Hazim Hanif; Mohd Hairul Nizam Md Nasir; Mohd Faizal Ab Razak; Ahmad Firdaus; Nor Badrul Anuar
The detection of software vulnerability requires critical attention during the development phase to make it secure and less vulnerable. Vulnerable software always invites hackers to perform malicious activities and disrupt the operation of the software, which leads to millions in financial losses to software companies. In order to reduce the losses, there are many reliable and effective vulnerability
-
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-02-16 Umer Majeed; Latif U. Khan; Ibrar Yaqoob; S.M. Ahsan Kazmi; Khaled Salah; Choong Seon Hong
A remarkable interest in the Internet of Things (IoT)-based smart cities from both academia and industry has been observed in recent years. Smart cities can offer various smart applications such as intelligent transportation, industry 4.0, smart banking, among others, for boosting the life quality of citizens. Security is one of the key challenges of a smart city. One can enable smart cities with a
-
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-29 Ankush Manocha; Munish Bhatia; Gulshan Kumar
Bronchial asthma is one of the most common chronic diseases of childhood and considered as a major health problem globally. The irregularity in meteorological factors has become a primary cause of health severity for the individuals suffering from asthma. In the presented research, a dew-cloud assisted cyber-physical system (CPS) is proposed to analyze the correlation between the meteorological and
-
Reliability optimization for industrial WSNs with FD relays and multiple parallel connections J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-29 Jie Jia; Jian Chen; Yansha Deng; Xingwei Wang; Abdol-Hamid Aghvami
This article investigates the ultra-reliable communication for industrial wireless sensor networks (IWSNs), where frequency diversity, path diversity and cooperative diversity are jointly investigated. We propose a novel IWSN equipped with the full-duplex (FD) relays and carrier aggregation (CA) technique, to improve the reliability of all sensors. We derive a closed-form expression for the reliability
-
Towards reliable and efficient data retrieving in ICN-based satellite networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-26 Yating Yang; Tian Song; Weijia Yuan; Jianping An
Building a reliable and efficient network layer for large-volume content delivery over satellite is extremely challenging due to space circumstances of unreliable connectivity, long propagation delay and high dynamics. In this paper, we address those challenges in satellite networking and propose an information-centric data retrieval scheme to provide disruption-tolerant, low-delay and highly efficient
-
MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-13 Mahender Kumar; Satish Chand
Recently, an infectious disease, coronavirus disease 2019 (COVID-19), has been reported in Wuhan, China, and spread worldwide within a couple of months. There have been seen an outbreak of COVID-19 in many countries, where the infected patients' rate overwhelmed the inadequate medical services. The push of patient-centered interoperability (PCI) from medical institution-centered interoperability may
-
Energy-efficient scheduling of small cells in 5G: A meta-heuristic approach J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-21 Md. Shahin Alom Shuvo; Md. Azad Rahaman Munna; Sujan Sarker; Tamal Adhikary; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Gianluca Aloi; Giancarlo Fortino
Scheduling of small cells in Fifth-Generation (5G) mobile network is highly important for achieving energy-efficiency and providing Quality of Service (QoS) to the applications users. Minimization of energy consumption hampers QoS. This problem has been further complicated due to exponential increase of mobile application users demanding high data rate. The performances of energy-saving approaches
-
A comprehensive survey and taxonomy of the SVM-based intrusion detection systems J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-19 Mokhtar Mohammadi; Tarik A. Rashid; Sarkhel H.Taher Karim; Adil Hussain Mohammed Aldalwie; Quan Thanh Tho; Moazam Bidaki; Amir Masoud Rahmani; Mehdi Hosseinzadeh
The increasing number of security attacks have inspired researchers to employ various classifiers, such as support vector machines (SVMs), to deal with them in Intrusion detection systems (IDSs). This paper presents a comprehensive study and investigation of the SVM-based intrusion detection and feature selection systems proposed in the literature. It first presents the essential concepts and background
-
Contra-*: Mechanisms for countering spam attacks on blockchain's memory pools J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-29 Muhammad Saad; Joongheon Kim; DaeHun Nyang; David Mohaisen
Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better understanding of their attack surface from both security and distributed systems standpoints. In this paper, and in the pursuit of understanding the attack surface of blockchains, we explore a new
-
Modeling and analyzing RFID Generation-2 under unreliable channels J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-05 Yihong Chen; Quanyuan Feng; Xiaolin Jia; Huayue Chen
EPCglobal Class-1 Generation-2 (RFID Generation-2) is a wireless communication system in Internet of Things. The models and analyses of RFID Generation-2 are important and have been reported. However, for usefulness and validity, existing models and analyses are mainly based on the assumptions that RFID runs in ideal wireless channels (no packet loss, no error code, and no capture effect). However
-
Adopting elitism-based Genetic Algorithm for minimizing multi-objective problems of IoT service placement in fog computing environment J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-08 B.V. Natesha; Ram Mohana Reddy Guddeti
Fog computing is an emerging computation technology for handling and processing the data from IoT devices. The devices such as the router, smart gateways, or micro-data centers are used as the fog nodes to host and service the IoT applications. However, the primary challenge in fog computing is to find the suitable nodes to deploy and run the IoT application services as these devices are geographically
-
Virtual reality: A survey of enabling technologies and its applications in IoT J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-08 Miao Hu; Xianzhuo Luo; Jiawen Chen; Young Choon Lee; Yipeng Zhou; Di Wu
Virtual Reality (VR) has shown great potential to revolutionize the market by providing users immersive experiences with freedom of movement. Compared to traditional video streaming, VR is with ultra high-definition and dynamically changes with users’ head and eye movements, which poses significant challenges for the realization of such potential. In this paper, we provide a detailed and systematic
-
A survey on the suitability of risk identification techniques in the current networked environment J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-18 Hamed Aboutorab; Omar K. Hussain; Morteza Saberi; Farookh Khadeer Hussain; Elizabeth Chang
Risk management is a necessary consideration in any decision-making activity. In global supply chains that are increasingly becoming internetworked and data-centric, risk management assists risk managers in making smart decisions to achieve their desired outcomes. Because of its importance, there are many studies in the literature on supply chain risk management. However, most of these are from a managerial
-
DISTILLER: Encrypted traffic classification via multimodal multitask deep learning J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-20 Giuseppe Aceto; Domenico Ciuonzo; Antonio Montieri; Antonio Pescapé
Traffic classification, i.e. the inference of applications and/or services from their network traffic, represents the workhorse for service management and the enabler for valuable profiling information. The growing trend toward encrypted protocols and the fast-evolving nature of network traffic are obsoleting the traffic-classification design solutions based on payload-inspection or machine learning
-
Secure and cost-effective controller deployment in multi-domain SDN with Baguette J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-07 Wendi Feng; Chuanchang Liu; Bo Cheng; Junliang Chen
-
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-09 Ali Shakarami; Ali Shahidinejad; Mostafa Ghobaei-Arani
The fast growth of under developing internet-based technologies has been leading to propose promising methods to handle the heterogeneous massive volume of data produced by pervasive smart equipments such as handy mobile devices. Thanks to the mentioned technologies, these mobile devices can run critical business/entertainment applications such as Augmented Reality, Virtual Reality, vehicular networks
-
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-31 Mehdi Sookhak; Mohammad Reza Jabbarpour; Nader Sohrabi Safa; F. Richard Yu
Emerging technologies are playing a critical role in the evolution of healthcare systems by presenting eHealth to provide high-quality services and better health to wide-range of patients. Achieving the eHealth goals highly depends on employing modern information and communication technologies (ICTs) to securely and efficiently collect and transmit electronic health records (EHRs) and make them accessible
-
LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-07 Liqing Qiu; Xiangbo Tian; Jianyi Zhang; Chunmei Gu; Shiqi Sai
Influence maximization aims to select k seed nodes from social networks so that the expected number of nodes activated by the seed nodes can be maximized. With the development and popularity of Internet technology, the influence maximization has become a vital problem, especially for viral marketing. However, most existing algorithms utilize the greedy strategy to select seed nodes, which usually leads
-
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020) J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-11 Pranav Nerurkar; Dhiren Patel; Yann Busnel; Romaric Ludinard; Saru Kumari; Muhammad Khurram Khan
Bitcoin system (or Bitcoin) is a peer-to-peer and decentralized payment system that uses cryptocurrency named bitcoins (BTCs) and was released as open-source software in 2009. Unlike fiat currencies, there is no centralized authority or any statutory recognition, backing, or regulation for Bitcoin. All transactions are confirmed for validity by a network of volunteer nodes (miners) and after collective
-
The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-17 Bahar Farahani; Farshad Firouzi; Markus Luecking
Digital revolution is characterized by the convergence of technologies — from cloud computing to edge/fog computing, Artificial Intelligence (AI), big data, Intelligent Internet of Things (IoT), and Distributed Ledger Technology (DLT) — that is blurring the lines between physical and digital worlds. In this context, the IoT tsunami, the ubiquitous adoption of intelligent connected devices, and the
-
MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-31 Yang Xiao; Qingqi Pei; Tingting Xiao; Lina Yao; Huan Liu
Many social studies and practical cases suggest that people's consumption behaviors and social behaviors are not isolated but interrelated. However, most existing research either predicts users' consumption preference or recommends friends to users without dealing with them simultaneously. In this paper, we propose a novel framework called MutualRec that jointly accomplishes the two tasks based on
-
SDRS: A stable data-based recruitment system in IoT crowdsensing for localization tasks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-31 Ahmed Alagha; Rabeb Mizouni; Shakti Singh; Hadi Otrok; Anis Ouali
Mobile Crowdsensing (MCS), an important component of the Internet of Things (IoT), is a paradigm which utilizes people carrying smart devices, referred to as “workers”, to perform various sensing tasks. A type of such tasks is localization, where the location of a certain target or event is to be found. The recruitment of the right set of workers to perform a localization task plays a paramount role
-
Content delivery enhancement in Vehicular Social Network with better routing and caching mechanism J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-01 Bo Yi; Xingwei Wang; Min Huang
Vehicular Social Network (VSN) emerges as one meaningful scenario of Mobile Social Network (MSN) and aims at addressing the traffic congestion and security problems in smart cities. However, the current IP based network connection cannot efficiently solve the high mobility and dynamically changing topology issues caused by VSN, which results in long routing latency and low cache hit ratio. In this
-
A GRU deep learning system against attacks in software defined networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-29 Marcos V.O. Assis; Luiz F. Carvalho; Jaime Lloret; Mario L. Proença
-
Joint edge caching and dynamic service migration in SDN based mobile edge computing J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-01 Chunlin Li; Lei Zhu; Weigang Li; Youlong Luo
In recent years, with the rapid growth in the demand for online streaming services, video streaming platforms are becoming more and more popular, and users' demand for low latency and high-quality services is increasing. Therefore, in order to be able to allocate caching resources reasonably to serve as many user requests as possible, and reduce latency and energy consumption, the edge cooperative
-
Analysis and comparison of mobility management strategies in public land mobile networks from a multiobjective perspective J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-23 Víctor Berrocal-Plaza; Miguel A. Vega-Rodríguez
Mobility management is one of the basic pillars of any mobile network. Thanks to this management task, mobile networks are able to track the subscribers’ movement along the service area in order to maintain calls and data sessions in progress as well as to deliver incoming calls and start new data sessions with an idle mobile device. To do that, every mobility management strategy is composed by two
-
Mutual authentication with multi-factor in IoT-Fog-Cloud environment J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-13 Leandro Loffi; Carla Merkle Westphall; Lukas Derner Grüdtner; Carlos Becker Westphall
Authentication of restricted memory devices presents significant problems since memory consumption is high in mutual authentication using cryptographic protocols in IoT environments. According to previous studies, the development of a multi-factor mutual authentication method that can be used in fog and cloud computing remains a challenge. The present work aims to improve a method of mutual authentication
-
RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-19 Lijun Sun; Qian Yang; Xiao Chen; Zhenxiang Chen
As the commercial use of 5G technologies has grown more prevalent, smart vehicles have become an efficient platform for delivering a wide array of services directly to customers. The vehicular crowdsourcing service (VCS), for example, can provide immediate and timely feedback to the user regarding real-time transportation information. However, different sources can generate spurious information towards
-
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-19 Yuexin Xiang; Wei Ren; Tiantian Li; Xianghan Zheng; Tianqing Zhu; Kim-Kwang Raymond Choo
While data sharing cross management is increasingly popular, there are challenges in such a decentralized data sharing mode, especially in terms of transaction fairness and copyright protection. However, few schemes consider both fairness and copyright protection in the current literature. In this paper, we propose a flexible and Ethereum-based scheme to facilitate copyright protection in data sharing
-
Spatial-temporal constrained particle filter for cooperative target tracking J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-11 Cheng Xu; Xinxin Wang; Shihong Duan; Jiawang Wan
Localization is one of the most important topics of cyber physical system. In the last decades, much attention has been paid to the precise localization and performance evaluation in wireless sensor networks. Inertial-measurement-unit and Time-of-Arrival fusion is a state-of-the-art method to solve the accumulative error and drifting problem faced by sole inertial-measurement-unit positioning and navigation
-
On the reduction of authoritative DNS cache timeouts: Detection and implications for user privacy J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-03 Tomas Hernandez-Quintanilla; Eduardo Magaña; Daniel Morató; Mikel Izal
The domain name system (DNS) is an Internet network service that is used by hosts to resolve IP addresses from symbolic names. This basic service has been attacked and abused many times, as it is one of the oldest and most vulnerable services on the Internet. Some DNS resolvers conduct DNS manipulation, in which authoritative DNS responses are modified. This DNS manipulation is sometimes used for legitimate
-
Proactive tasks management for Pervasive Computing Applications J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-10 Kostas Kolomvatsos
Current advances in the Internet of Things (IoT) and Edge Computing (EC) involve numerous devices/nodes present at both ‘layers’ being capable of performing simple processing activities close to end users. This approach targets to limit the latency that users face when consuming the provided services. The minimization of the latency requires for novel techniques that deliver efficient schemes for tasks
-
A survey on network forwarding in Software-Defined Networking J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-09 Liang Yang; Bryan Ng; Winston K.G. Seah; Lindsay Groves; Deepak Singh
The packet forwarding behaviour of a network relies on the forwarding rules residing in the networking element (e.g. switches and routers) to forward packets. This applies to both traditional networking and software-defined networking (SDN). These forwarding rules vary in their structures and sizes, but they represent the same fundamental functionality: to match incoming packets against rules and determine
-
SPO: A Secure and Performance-aware Optimization for MapReduce Scheduling J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-01 Neda Maleki; Amir Masoud Rahmani; Mauro Conti
MapReduce is a common framework that effectively processes multi-petabyte data in a distributed manner. Therefore, MapReduce is widely used in heterogeneous environments, such as cloud, to provide performance adequate for system needs. Despite the MapReduce benefits, tweaking the system configuration to achieve the maximum performance is still challenging and needs deep expertise. Besides, some new
-
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-10 Ahsan Manzoor; An Braeken; Salil S. Kanhere; Mika Ylianttila; Madhsanka Liyanage
Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected, most of the current IoT systems are using centralized cloud-based data sharing systems, which will be difficult to scale up to meet the demands of future IoT systems. The involvement of such a third-party service provider requires also trust from both the sensor owner and sensor data user. Moreover, fees
-
Unified and standalone monitoring module for NFV/SDN infrastructures J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-02 Piotr Borylo; Gianluca Davoli; Michal Rzepka; Artur Lason; Walter Cerroni
In the ongoing process of telecommunications systems softwarization, a key role is played by Virtual Network Functions deployed in Cloud environments and interconnected through Software Defined Networks. The separation between data, control and service logic changes the way in which those systems are designed, operated, and capitalized, and also enables elasticity, flexibility and cost-efficiency in
-
Fine granularity resource allocation of virtual data center with consideration of virtual switches J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-26 Yang Yang; Songtao Guo; Guiyan Liu; Lin Yi
Virtual data center (VDC) embedding is being regarded as a critical issue to provide performance guarantees for the future success of cloud computing. Most existing works neglected the embedding of virtual switches (VSs), especially, on the physical switches (PSs), resulting in low utilization of physical resources. Moreover, most works assumed that multiple virtual nodes in the same request cannot
-
Network-aware task selection to reduce multi-application makespan in cloud J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-07 Jie Xu; Jingyu Wang; Qi Qi; Jianxin Liao; Haifeng Sun; Zhu Han; Tonghong Li
One new metric that plays a vital role in evaluating the cloud service is the multi-application makespan. There are usually multiple applications without a deadline in the cloud, while the makespan of each application should be minimized, such as parallel applications for training neural networks. However, the previous scheduling rule, called moving the computation tasks of applications closer to data
-
Renewable energy powered sustainable 5G network infrastructure: Opportunities, challenges and perspectives J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-28 Adil Israr; Qiang Yang; Wei Li; Albert Y. Zomaya
A massive increase in the amount of data traffic over mobile wireless communication has been observed in recent years, while further rapid growth is expected in the years ahead. The current fourth-generation (4G) mobile networks are evolving to the fifth-generation (5G) networks to fulfill the demand for high data rates and broad network coverage. The advent of the ultra-dense 5G network and a vast
-
The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-20 Will Serrano
5G promises much faster Internet transmission rates at minimum latencies with indoor and outdoor coverage in Smart Cities. 5G could potentially replace traditional Wi-Fi for network connectivity and Bluetooth technology for geolocation with a seamless radio coverage and network backbone therefore accelerating new services such as the Internet of Things (IoT). Although Wi-Fi 6 is already in the market
-
Wersync: A web platform for synchronized social viewing enabling interaction and collaboration J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-12-05 Fernando Boronat; Mario Montagud; Pau Salvador; Javier Pastor
Shared media experiences between geographically distributed users are gaining momentum. When remote users are consuming online media content together while interacting, several challenges still need to be addressed to provide an enjoyable experience (e.g. in terms of delays and synchronization). This paper presents Wersync, a web-based platform that enables the creation of different groups of geographically
-
Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-27 Mian Ahmad Jan; Jinjin Cai; Xiang-Chuan Gao; Fazlullah Khan; Spyridon Mastorakis; Muhammad Usman; Mamoun Alazab; Paul Watters
The Internet of Multimedia Things (IoMT) orchestration enables the integration of systems, software, cloud, and smart sensors into a single platform. The IoMT deals with scalar as well as multimedia data. In these networks, sensor-embedded devices and their data face numerous challenges when it comes to security. In this paper, a comprehensive review of the existing literature for IoMT is presented
-
Towards end-to-end resource provisioning in Fog Computing over Low Power Wide Area Networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-21 José Santos; Tim Wauters; Bruno Volckaert; Filip De Turck
Recently, with the advent of the Internet of Things (IoT), Smart Cities have emerged as a potential business opportunity for most cloud service providers. However, centralized cloud architectures cannot sustain the requirements imposed by many IoT services. High mobility coverage and low latency constraints are among the strictest requirements, making centralized solutions impractical. In response
-
Field surveillance of fuel dispensers using IoT-based metering and blockchains J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-28 Wilson S. Melo; Luiz V. Tarelho; Bruno A. Rodrigues; Alysson N. Bessani; Luiz F.R.C. Carmo
The field surveillance of fuel dispensers is an activity of Legal Metrology that checks these measuring instruments' correct behavior. However, it constitutes a complex challenge because malicious entities can tamper with fuel dispensers to get undue economic advantages. This paper proposes a distributed and decentralized solution. We use IoT-based vehicle simple meters to estimate the fuel amount
-
From smart parking towards autonomous valet parking: A survey, challenges and future Works J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-23 Muhammad Khalid; Kezhi Wang; Nauman Aslam; Yue Cao; Naveed Ahmad; Muhammad Khurram Khan
Recently, we see an increasing number of vehicles coming into our lives, which makes finding car parks a difficult task. To overcome this challenge, efficient and advanced parking techniques are required, such as finding the proper parking slot, increasing users’ experience, dynamic path planning and congestion avoidance. To this end, this survey provides a detailed overview starting from Smart Parking
-
A privacy-preserving consensus mechanism for an electric vehicle charging scheme J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-16 Xiaoshuai Zhang; Chao Liu; Kok Keong Chai; Stefan Poslad
The increasing adoption of Electric Vehicles (EVs) brings opportunities for electric power transactions for users to be able to trade their excess electricity. Blockchain technology is envisaged as an electricity exchange platform to minimise the time gap and cost in the trading process. We propose a public electric power exchange service network with a gateway-based privacy-preserving scheme to implement
-
QoS-oriented joint optimization of concurrent scheduling and power control in millimeter wave mesh backhaul network J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-21 Zhongyu Ma; Jie Cao; Qun Guo; Xiangwei Li; Hongfeng Ma
Millimeter-wave mesh backhaul network (mm-wave MBN) is a key potential technology for massive traffic backhaul in 5G and beyond. However, one of the most urgent challenges is the high capacity and green backhaul solution. To that end, a QoS-oriented joint optimization of concurrent scheduling and power control is investigated, where the QoS demands of the transmission flows are fully considered. Firstly
-
FAMD: A Flow-Aware Marking and Delay-based TCP algorithm for datacenter networks J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-19 Yifei Lu; Xu Ma; Zhengzhi Xu
Datacenter networks have brought new challenges to meet datacenters’ unique performance requirements. Moreover, the many-to-one traffic pattern, which is quite common in datacenter networks, causes heavy network congestion and leads to TCP incast problem. To solve this problem, many TCP congestion control protocols have been proposed to mitigate the TCP incast. However, these protocols have more or
-
DroneCells: Improving spectral efficiency using drone-mounted flying base stations J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-04 Azade Fotouhi; Ming Ding; Mahbub Hassan
We study a networking scenario for 5G and beyond, called DroneCells, where miniaturized base stations (BSs) are mounted on flying drones to serve mobile users. We propose that the drones never stop, and move continuously within the cell in a way that reduces the distance between the BS and the serving users, thus potentially improving the spectral efficiency of the network. By considering the practical
-
Routing in the Space Internet: A contact graph routing tutorial J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-11-11 Juan A. Fraire; Olivier De Jonckère; Scott C. Burleigh
A Space Internet is possible, as long as the delay and disruption challenges imposed by the space environment are properly tackled. Because these conditions are not well addressed by terrestrial Internet, more capable Delay-Tolerant Networking (DTN) protocols and algorithms are being developed. In particular, the principles and techniques for routing among ground elements and spacecraft in near-Earth
-
A comprehensive survey of load balancing techniques in software-defined network J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2020-10-24 Mosab Hamdan; Entisar Hassan; Ahmed Abdelaziz; Abdallah Elhigazi; Bushra Mohammed; Suleman Khan; Athanasios V. Vasilakos; M.N. Marsono