-
SYNTROPY: TCP SYN DDoS attack detection for software defined network based on Rényi entropy Comput. Netw. (IF 5.6) Pub Date : 2024-03-12 Vaishali A. Shirsath, Madhav M. Chandane, Chhagan Lal, Mauro Conti
The rapidly evolving landscape of network security, particularly in Software Defined Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection methods, especially in the face of TCP SYN DDoS attacks. These attacks pose significant threats to network resources and service availability. Current state-of-the-art solutions, predominantly based on Shannon entropy, have inherent
-
Queuing models of links carrying streaming and elastic services Comput. Netw. (IF 5.6) Pub Date : 2024-03-12 Andrea Marin, Marco Ajmone Marsan, Michela Meo, Matteo Sereno
We consider an access link carrying data generated by streaming and elastic services requested by fixed or mobile end users, and subjected to an admission control (AC) algorithm. For the performance analysis of such link we develop a new queuing model and we show that, with the considered AC, the queuing model admits a product form expression for the joint limiting probability distribution of the numbers
-
Towards robust and privacy-preserving federated learning in edge computing Comput. Netw. (IF 5.6) Pub Date : 2024-03-12 Hongliang Zhou, Yifeng Zheng, Xiaohua Jia
Federated learning (FL) has recently emerged as an attractive distributed machine learning paradigm for harnessing the distributed data in edge computing. Its salient feature is that the individual datasets can stay local all the time during the training process and only model updates need to be exchanged for aggregation. Despite being intriguing, FL is also known to be confronted with critical security
-
Edge computing offloading strategy for space-air-ground integrated network based on game theory Comput. Netw. (IF 5.6) Pub Date : 2024-03-11 Liang Liu, Wuping Mao, Wenwei Li, Jie Duan, Guanyu Liu, Bingchuan Guo
The limited coverage of terrestrial networks makes it difficult to provide low-latency and high-reliable computing services for users and Internet of Thing (IoT) devices in remote areas such as mountainous regions and oceans. Space-Air-Ground Integrated Network (SAGIN) combined with Mobile Edge Computing (MEC) can provide seamless three-dimensional services for users by deploying edge servers on satellites
-
Space and Time User Distribution Measurements Dataset in a University Campus Comput. Netw. (IF 5.6) Pub Date : 2024-03-11 Olga Ruiz, Juan Sánchez-González, Jordi Pérez-Romero, Oriol Sallent, Irene Vilà
Radio Resource Management (RRM) strategies are essential components in mobile wireless networks, such as LTE or 5G-NR . The design of RRM algorithmic solutions is an area of research that has received a lot of attention for decades (see e.g. surveys [,,] and references therein). Given that RRM strategies need to handle traffic dynamicity in the Radio Access Network (RAN), the availability of realistic
-
A measurement-based approach to analyze the power consumption of the softwarized 5G core Comput. Netw. (IF 5.6) Pub Date : 2024-03-11 Arturo Bellin, Fabrizio Granelli, Daniele Munaretto
In light of the ever growing energy needs of the ICT sector, a value that is becoming increasingly important for a mobile network is its . However, the transition away from legacy network deployments tightly coupled with the underlying hardware and the adoption of the Network Function Virtualization (NFV) paradigm has made more difficult to accurately evaluate their energy and carbon footprint. In
-
Client Scheduling and Bandwidth Slicing for Multiple Federated Learning Tasks over Multiple Passive Optical Networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-11 Meihua Bi, Chenghao Yan, Rui Lin, Yuanyuan Hong, Jun Li
Federated Learning (FL) has attracted extensive attention in facilitating emerging edge intelligence applications for its inherent advantages of ensuring data security and privacy. Especially in the edge computing networks connected by Passive Optical Network (PON) system, FL is introduced to enable applications like autonomous driving, intelligent manufacturing, and precision medicine. However, in
-
Edge collaborative caching solution based on improved NSGA II algorithm in Internet of Vehicles Comput. Netw. (IF 5.6) Pub Date : 2024-03-11 Sifeng Zhu, Xiaohua Tian, Hao Chen, Hai Zhu, Rui Qiao
With the rapid development of the Internet of Vehicles technology and the continuous advancement of intelligent transportation, vehicle network traffic is growing exponentially. Traditional caching solutions transmit content through the core network, causing significant latency. A vehicle-cloud collaborative edge caching network architecture was proposed to address this type of problem. Using this
-
A RNN-based approach to physical layer authentication in underwater acoustic networks with mobile devices Comput. Netw. (IF 5.6) Pub Date : 2024-03-11 Francesco Ardizzon, Paolo Casari, Stefano Tomasin
Underwater acoustic communications are becoming a popular solution for underwater data communications and telemetry, making the authentication of transmitted data a necessity. In this paper, we propose a physical-layer authentication strategy for underwater acoustic networks (UWANs) with mobile devices. Such a scenario is more challenging than classical authentication scenarios in static networks,
-
Robust integration of blockchain and explainable federated learning for automated credit scoring Comput. Netw. (IF 5.6) Pub Date : 2024-03-07 Zorka Jovanovic, Zhe Hou, Kamanashis Biswas, Vallipuram Muthukkumarasamy
This article examines the integration of blockchain, eXplainable Artificial Intelligence (XAI), especially in the context of federated learning, for credit scoring in financial sectors to improve the credit assessment process. Research shows that integration of these cutting-edge technologies is in its infancy, specifically in the areas of embracing broader data, model verification, behavioural reliability
-
Adaptive overlay selection at the SD-WAN edges: A reinforcement learning approach with networked agents Comput. Netw. (IF 5.6) Pub Date : 2024-03-06 Alessio Botta, Roberto Canonico, Annalisa Navarro, Giovanni Stanco, Giorgio Ventre
Software-Defined Wide Area Networks (SD-WANs) have emerged as a promising solution to address the connectivity demands of modern distributed enterprises. However, the effective application of the Software Defined Networking (SDN) paradigm in such broad and dynamic environments remains a significant challenge. In this paper, we present two novel contributions. First, we design a decentralized control
-
A Blockchain-based carbon emission security accounting scheme Comput. Netw. (IF 5.6) Pub Date : 2024-03-05 Yunhua He, Shuang Wang, Zhihao Zhou, Ke Xiao, Anke Xie, Bin Wu
To solve the problem of climate warming, countries around the world have paid special attention to the construction of carbon governance. Carbon emission accounting is an important policy tool to control the vented CO. But at present, there are third-party agencies in carbon emission accounting that cannot ensure the fairness and impartiality of accounting, and there may be risks such as illegal use
-
Detecting malicious proxy nodes during IoT network joining phase Comput. Netw. (IF 5.6) Pub Date : 2024-03-05 Ali Haj-Hassan, Youcef Imine, Antoine Gallais, Bruno Quoitin
During the joining phase of an IoT network, when a node plays the role of a proxy node, it becomes responsible for forwarding Join Requests and Join Responses between the joining node and the network coordinator. If a proxy node is malicious, it has the potential to prevent new nodes from joining the network or direct them towards another entity impersonating the coordinator. Therefore, the joining
-
An energy efficient fusing data gathering protocol in wireless sensor networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-04 Yu Song, Shilong Zhang, Shubin Wang
The Internet of Things (IoT) is rapidly developing as a promising technology for today’s digital world. Wireless sensor networks (WSN) are a crucial component of IoT, and one of the major problems faced is energy constraints. The clustering protocol is an effective energy saving solution. In this paper, we propose an energy efficient fusing data gathering protocol via distributed second level clustering
-
Resource sharing for collaborative edge learning: A privacy-aware incentive mechanism combined with demand prediction Comput. Netw. (IF 5.6) Pub Date : 2024-03-03 Shiyou Chen, Lanlan Rui, Zhipeng Gao, Yang Yang, Xuesong Qiu, Shaoyong Guo
Edge intelligence benefits from ubiquitous resource capabilities by numerous edge devices. However, interest concerns and privacy issues caused by the openness of the edge network make smart devices reluctant to participate in collaborative edge learning. This work proposes a privacy-aware incentive mechanism based on combinatorial double auction (PIMCDA) to facilitate idle resource sharing of diversified
-
Collaborative Filtering-based Fast Delay-aware algorithm for joint VNF deployment and migration in edge networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Zhuofan Liao, Wenqiang Deng, Shiming He, Qiang Tang
As Network Function Virtualization (NFV) continues to advance, Virtual Network Functions (VNFs) such as firewalls are increasingly used. Service Function Chains (SFCs) are formed by combining specific VNFs in a particular order, which are then deployed on the physical network to provide dedicated services to end users. Occasionally, partial VNF migration is employed to maintain service and network
-
Design and implementation of a frame preemption model without guard bands for time-sensitive networking Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Zhe Zhao, Zhiliang Qiu, Weitao Pan, Hui Li, Ling Zheng, Ya Gao
In time-sensitive networks, the frames of time-triggered (TT) flows need to be transmitted in scheduled slots. To avoid the interference of frames from other flows to the frames of the TT flows, guard bands are generally reserved prior to scheduled slots. The time-sensitive networking (TSN) standard, IEEE 802.1Qbu, specifies a frame preemption model that enables frames of TT flows (preemption frames)
-
A hierarchical distributed trusted location service achieving location k-anonymity against the global observer Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini
As widely known in the literature, location-based services can seriously threaten users’ privacy. Privacy-aware location-based services can be obtained by protecting the user’s identity, so that queries cannot be linked with users. A way to do this is to place a trusted third party, called , between the user and the service provider, with the role of mediating the queries coming from the users and
-
Reducing CO2 emissions in a peer-to-peer distributed payment network: Does geography matter in the lightning network? Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Danila Valko, Daniel Kudenko
Bitcoin, Ethereum and other blockchain-related globally distributed peer-to-peer networks have become an important payment infrastructure. Because they are naturally decentralized and distributed, they can consume resources unevenly, raising some sustainability concerns. The Lightning Network (LN) is a growing but understudied second layer network built on blockchain infrastructure and designed to
-
Hybrid learning strategies for multivariate time series forecasting of network quality metrics Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Mario Di Mauro, Giovanni Galatro, Fabio Postiglione, Wei Song, Antonio Liotta
This work addresses the challenge of forecasting temporal metrics that characterize cellular traffic behavior. The ultimate goal is to provide network operators with a valuable tool for modeling mobile network traffic and optimizing connected resources. The idea is to estimate beforehand the temporal evolution of some Quality-of-Experience (QoE) and Quality-of-Service (QoS) metrics, which is helpful
-
TLS-handshake for Plug and Charge in vehicular communications Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Ahmet Kilic
Electric vehicle technology has brought some important issues to order. Securing the communication between electric vehicle and charging station is an important one. The International Organization for Standardization released ISO 15118 standard to specify the communication between electric vehicles and electric vehicle supply equipment. The ISO 15118 standard requires Transport Layer Security function
-
The drift handling framework for open radio access networks: An experimental evaluation Comput. Netw. (IF 5.6) Pub Date : 2024-03-01 Venkateswarlu Gudepu, Venkatarami Reddy Chintapalli, Piero Castoldi, Luca Valcarenghi, Bheemarjuna Reddy Tamma, Koteswararao Kondepu
The Open Radio Access Network (i.e., Open RAN) aims to transform the inflexible, proprietary RAN into one that is flexible, programmable, and disaggregated to provide intelligent solutions at the network edge for delivering the highly dynamic service demands of Beyond 5G (B5G) networks. Open RAN Working Group-2 (WG2) focuses on the architecture and standards of Artificial Intelligence/Machine Learning
-
An improved cost function-based class of service provisioning scheme for elastic optical networks Comput. Netw. (IF 5.6) Pub Date : 2024-02-29 Deepak Batham, Vandana Vikas Thakare
Elastic optical network (EON) is a trusted communication network which supports the advance services like 5G/6G, IoT, cloud computing, store-and-forward big-data, high definition video-on-demand, artificial intelligence, and machine learning. Due to the enormous use of these emerging services, the Internet traffic increases manifold time. These services require high and flexible bandwidth with heterogeneous
-
HSGAN-IoT: A hierarchical semi-supervised generative adversarial networks for IoT device classification Comput. Netw. (IF 5.6) Pub Date : 2024-02-29 Yanliang Jin, Jiahao Zhou, Yuan Gao
In recent years, IoT device classification has become a highly focused issue, because it can achieve network performance optimization, security threat detection, application scenario analysis and device performance evaluation. Existing researches mainly focus on two types of methods: machine learning (ML) and deep learning (DL). However, with the continuous emergence of new devices, ML methods require
-
L2-BiTCN-CNN: Spatio-temporal features fusion-based multi-classification model for various internet applications identification Comput. Netw. (IF 5.6) Pub Date : 2024-02-29 Zhiyuan Li, Xiaoping Xu
Identifying various types of Internet applications is a key issue for network management. Traffic classification is one of the important technologies for identifying Internet applications traffic. However, some secure technologies such as protocol encryption, information hiding, and traffic obfuscation pose new challenges to traffic identification and classification, especially in feature extraction
-
Network traffic prediction with Attention-based Spatial–Temporal Graph Network Comput. Netw. (IF 5.6) Pub Date : 2024-02-29 Yufei Peng, Yingya Guo, Run Hao, Chengzhe Xu
Network traffic prediction plays a significant role in network management. Previous network traffic prediction methods mainly focus on the temporal relationship between network traffic, and used time series models to predict network traffic, ignoring the spatial information contained in traffic data. Therefore, the prediction accuracy is limited, especially in long-term prediction. To improve the prediction
-
Energy efficient and delay aware deployment of parallelized service function chains in NFV-based networks Comput. Netw. (IF 5.6) Pub Date : 2024-02-28 Venkatarami Reddy Chintapalli, Rajat Partani, Bheemarjuna Reddy Tamma, Siva Ram Murthy C.
Network Functions Virtualization (NFV) replaces traditional hardware-based network equipment and middleboxes with flexible Virtualized Network Functions (VNFs) in order to reduce costs and improve agility and scalability. The VNFs are logically arranged in a specific sequence to form a Service Function Chain (SFC) which ensures that the traffic is processed according to the desired service requirements
-
Zero-touch networks: Towards next-generation network automation Comput. Netw. (IF 5.6) Pub Date : 2024-02-28 Mirna El Rajab, Li Yang, Abdallah Shami
The Zero-touch network and Service Management (ZSM) framework represents an emerging paradigm in the management of the fifth-generation (5G) and Beyond (5G+) networks, offering automated self-management and self-healing capabilities to address the escalating complexity and the growing data volume of modern networks. ZSM frameworks leverage advanced technologies such as Machine Learning (ML) to enable
-
Machine learning-powered traffic processing in commodity hardware with eBPF Comput. Netw. (IF 5.6) Pub Date : 2024-02-28 Jorge Gallego-Madrid, Irene Bru-Santa, Alvaro Ruiz-Rodenas, Ramon Sanchez-Iborra, Antonio Skarmeta
Network softwarization is paving the way for the design and development of Next-Generation Networks (NGNs), which are demanding profound improvements to existing communication infrastructures. Two of the fundamental pillars of NGNs are flexibility and intelligence to create elastic network functions capable of managing complex communication systems in an efficient and cost-effective way. In this sense
-
Securing cooperative vehicular networks amid obstructing vehicles and mixed fading channels Comput. Netw. (IF 5.6) Pub Date : 2024-02-28 Mohamed G. Abd El Ghafour, Ahmed H. Abd El-Malek, Ola E. Hassan, Mohammed Abo-Zahhad
Smart cities (SCs) were founded on the basis of the Internet of Vehicles paradigm, aiming to enhance the quality of life. Despite not having a unique composition, the intelligent transportation services (ITS) is a key component in most of the SCs. The ITS integrates the new communication systems along with the traditional transportation systems, forming a universal network of static and vehicular entities
-
Eavesdropping with intelligent reflective surfaces: Near-optimal configuration cycling Comput. Netw. (IF 5.6) Pub Date : 2024-02-28 Francesco Malandrino, Alessandro Nordio, Carla Fabiana Chiasserini
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communication security and privacy. In this work, we focus on the latter aspect and introduce a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users that are facilitated by the presence of IRSs. Specifically
-
The Evolution of Mobile Network Operations: A Comprehensive Analysis of Open RAN Adoption Comput. Netw. (IF 5.6) Pub Date : 2024-02-27 Line M.P. Larsen, Henrik L. Christiansen, Sarah Ruepp, Michael S. Berger
As Mobile Network Operators (MNOs) seek to revolutionise their infrastructures and meet the growing demands of a data-centric world, the adoption of open RAN (Radio Access Network) technology has emerged as a compelling solution. This paper offers a comprehensive exploration of open RAN’s transformative potential within the MNO landscape and investigates the concrete implementation opportunity of Open-RAN
-
Relay-empowered beyond 5G radio access networks with edge computing capabilities Comput. Netw. (IF 5.6) Pub Date : 2024-02-24 I. Vilà, O. Sallent, J. Pérez-Romero
Relevant services envisaged for beyond 5G (B5G) systems, such as extended reality and holographic communications, have extremely demanding user experience requirements with significant computational and communication demands. While edge computing aims to address the computation requirements by offloading the computational tasks to edge servers near the user, the communication will take advantage of
-
TABDeep: A two-level action branch architecture-based deep reinforcement learning for distributed sub-tree scheduling of online multicast sessions in EON Comput. Netw. (IF 5.6) Pub Date : 2024-02-24 Xia Li, Yuping Wang
The surge in demand for multimedia applications has brought a great pressure on network bandwidth resources. In order to improve the efficiency of bandwidth resource usage and ensure the transmission quality of multicast sessions, it is very urgent to effectively schedule online multicast sessions. To do so, in this paper, we study the distributed sub-tree scheduling problem of online multicast sessions
-
QoS-aware task offloading and resource allocation optimization in vehicular edge computing networks via MADDPG Comput. Netw. (IF 5.6) Pub Date : 2024-02-23 Jingxian Liu, Yitian Wang, Duotao Pan, Decheng Yuan
To meet the stringent requirements for real-time performance of computing tasks on the Internet of Vehicles (IoV) scenario, the Mobile Edge Computing (MEC) technique is introduced to combine edge servers with vehicles that have storage and computing resources, thereby reducing latency. However, successfully accessing the channel and completing the offloading computation within the specified time remains
-
Let gambling hide nowhere: Detecting illegal mobile gambling apps via heterogeneous graph-based encrypted traffic analysis Comput. Netw. (IF 5.6) Pub Date : 2024-02-23 Zheyuan Gu, Gaopeng Gou, Chang Liu, Chen Yang, Xiyuan Zhang, Zhen Li, Gang Xiong
Mobile gambling apps, as a new type of online gambling service, have not only enriched people’s online entertainment activities but also brought about negative impacts for both individuals and society. Existing gambling app detection methods mainly extract static content-based characteristics, such as vision and textual features, to mine the key information from the user interface to detect gambling
-
INVISIBLE 2.0: An enhanced interference-based handover technique for visible light communications in vehicular networks Comput. Netw. (IF 5.6) Pub Date : 2024-02-22 Meysam Mayahi, Valeria Loscrí, Anna Maria Vegni
Since the last decade, Visible Light Communication (VLC) has represented a huge capacity to complement conventional Radio Frequency (RF) technologies in plenty of applications. The credibility of VLC in terms of power consumption has always been compared to RF. In this work, in addition to addressing this issue through a detailed power model, the co-existence of VLC and the Long-Term Evolution (LTE)
-
A self-stabilizing and auto-provisioning orchestration for microservices in edge-cloud continuum Comput. Netw. (IF 5.6) Pub Date : 2024-02-22 Binlei Cai, Xiaoli Wang, Bin Wang, Meihong Yang, Ying Guo, Qin Guo
Modern user-facing services are progressively evolving from large monolithic applications to complex graphs of loosely-coupled microservices. While this shift provides opportunities to offload some microservices of a user-facing service to edge devices that are close to the end users, it also complicates the application deployment and resource provisioning in the edge-cloud continuum, due to complex
-
Digital twin modeling of open category UAV radio communications: A case study Comput. Netw. (IF 5.6) Pub Date : 2024-02-21 D. Aláez, P. Lopez-Iturri, M. Celaya-Echarri, L. Azpilicueta, F. Falcone, J. Villadangos, J.J. Astrain
The modeling of radio links plays a crucial role in achieving mission success of unmanned aerial vehicles (UAVs). By simulating and analyzing communication performance, operators can anticipate and address potential challenges. In this paper, we propose a full-featured UAV software-in-the-loop digital twin (SITL-DT) for a heavy-lifting hexacopter that integrates a radio link module based on an experimental
-
-
A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs Comput. Netw. (IF 5.6) Pub Date : 2024-02-21 David Soler, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández Vilas, Francisco J. Nóvoa
High-entropy random numbers are an essential part of cryptography, and Quantum Random Number Generators (QRNG) are an emergent technology that can provide high-quality keys for cryptographic algorithms but unfortunately are currently difficult to access. Existing Entropy-as-a-Service solutions require users to trust the central authority distributing the key material, which is not desirable in a high-privacy
-
Reliable edge-to-core optical networks: An optimal algorithm for maximal path diversity Comput. Netw. (IF 5.6) Pub Date : 2024-02-20 Ali Shakeri, Tianliang Zhang, Shunmugapriya Ramanathan, Miguel Razo, Marco Tacca, Andrea Fumagalli
With the emergence of IoT applications, 5G, and edge computing, network resource allocation has shifted toward the edge, bringing services closer to the end users. These applications often require communication with the core network for purposes that include cloud storage, compute offloading, 5G-and-Beyond transport communication between centralized unit (CU), distributed unit (DU) and core network
-
UAV-assisted fair communications for multi-pair users: A multi-agent deep reinforcement learning method Comput. Netw. (IF 5.6) Pub Date : 2024-02-20 Xijian Luo, Jun Xie, Liqin Xiong, Zhen Wang, Yaqun Liu
Unmanned aerial vehicle (UAV) plays an important role in scenarios like search and rescue, remote communication relay, battlefield mobile networks, etc. In this paper, we investigate multiple UAV relays providing real-time transmission for multi-pair ground users (GUs) in the absence of ground-based stations (GBSs). Due to the limited load capacities and energy resources on-board, fairness between
-
Comparison of error correction codes via optimal channel replay of high north underwater acoustic channels Comput. Netw. (IF 5.6) Pub Date : 2024-02-19 Konstantinos Pelekanakis, Pietro Paglierani, Alberto Alvarez, João Alves
This paper aims to enhance the reliability of underwater acoustic (UWA) communications by evaluating the effectiveness of various Forward Error Correction (FEC) codes. In the absence of standardized UWA physical layer simulators, we rely on in-situ data to assess the performance of six FEC codes: convolutional, turbo, Low-Density Parity Check (LDPC), Bose– Chaudhuri–Hocquenghem (BCH), Turbo Product
-
Performance analyses of intelligent reflecting surface aided downlink multi-user rate-splitting multiple access system for 6G applications Comput. Netw. (IF 5.6) Pub Date : 2024-02-19 Aswini K., Surendar M.
The future wireless networks will handle extremely high data rates and fundamentally new applications, demanding a paradigm leap in wireless radio technology. The combination of rate-splitting multiple access (RSMA) and an intelligent reflecting surface (IRS) is an efficient way for improving the spectral/energy efficiency of next-generation wireless networks, such as 5G and beyond and 6G. In this
-
Joint user grouping and resource allocation scheme based on user satisfaction management for indoor multicolor VLC-NOMA network Comput. Netw. (IF 5.6) Pub Date : 2024-02-19 Huanlin Liu, Xilin Yuan, Yong Chen, Yang Hu, Huiling Zhou, Wenjie Song
Due to the advantages of multicolor, such as wavelength-division multiplexing (WDM), incorporating multicolor into a visible light communication (VLC) network can significantly enhance the performance compared to traditional VLC networks. To mitigate inter-cell interference (ICI) and support multiple users, non-orthogonal multiple access (NOMA) is implemented in the multicolor VLC network to improve
-
Blockchain-based cloud-fog collaborative smart home authentication scheme Comput. Netw. (IF 5.6) Pub Date : 2024-02-18 Huan Yang, Yajun Guo, Yimin Guo
With the rapid development of IoT technology, smart homes have emerged. At the same time, data security and privacy protection are also of great concern. However, the traditional centralized authentication scheme has defects such as single point of failure, poor scalability, center dependence, vulnerability to attacks, etc., and is not suitable for the distributed and dynamically changing smart home
-
Matrix Profile data mining for BGP anomaly detection Comput. Netw. (IF 5.6) Pub Date : 2024-02-17 Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson
The Border Gateway Protocol (BGP), acting as the communication protocol that binds the Internet, remains vulnerable despite Internet security advancements. This is not surprising, as the Internet was not designed to be resilient to cyber-attacks, therefore the detection of anomalous activity was not of prime importance to the Internet creators. Detection of BGP anomalies can potentially provide network
-
Reducing the In band Network Telemetry overhead through the spatial sampling: Theory and experimental results Comput. Netw. (IF 5.6) Pub Date : 2024-02-17 Marco Polverini, Stefania Sardellitti, Sergio Barbarossa, Antonio Cianfrani, Paolo Di Lorenzo, Marco Listanti
In band Network Telemetry (INT) allows for a high accurate monitoring of the network status, at the cost of an increased overhead, due to the insertion of telemetry information in the packets carrying the user data. In this paper we present a novel approach to reduce the overhead due to the realization of network monitoring solutions based on the use of INT. In particular we introduce the concept of
-
Consortium blockchain private key protection scheme based on rational secret sharing and blockchain Comput. Netw. (IF 5.6) Pub Date : 2024-02-17 Zhimei Yang, Changgen Peng, Chongyi Zhong, Yangyang Long
In a consortium blockchain, the loss of a private key can result in significant losses for users, making the protection of private keys particularly crucial. Traditional distributed private key protection methods are susceptible to threats such as node silence and collusion, leading to the inability to reconstruct the private key smoothly. To address this issue, this paper proposes a private key protection
-
WatchEDGE: Smart Networking for Distributed AI-Based Environmental Control Comput. Netw. (IF 5.6) Pub Date : 2024-02-17 Guido Maier, Antonino Albanese, Michele Ciavotta, Nicola Ciulli, Stefano Giordano, Elisa Giusti, Alfredo Salvatore, Giovanni Schembra
Modern applications that make extensive use of AI and ML require the support of an agile network environment that allows raw data to be processed at the edge, where they are collected, while computing functions both for the training and inference phases need to be efficiently moved from site to site. In this paper we present the WatchEDGE project. WatchEDGE studies an advanced edge-computing architecture
-
A cost and demand sensitive adjustment algorithm for service function chain in data center network Comput. Netw. (IF 5.6) Pub Date : 2024-02-16 Yuantao Wang, Zhaogang Shu, Shuwu Chen, Jiaxiang Lin, Zhenchang Zhang
The introduction of Network Function Virtualization (NFV) and Software-Defined Network (SDN) architectures has significantly reduced the Operational Expenditure (OPEX) and Capital Expenditure (CAPEX) of network system. However, NFV orchestration management also brings about challenges. After the initial deployment of VNFs, due to the volatility of network requests, the original deployment may not be
-
Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities Comput. Netw. (IF 5.6) Pub Date : 2024-02-16 Shunliang Zhang, Dali Zhu, Yinlong Liu
With the commercial deployment of the 5G system, researchers from both academia and industry are moving attention to the blueprint of the 6G system. The space–air–ground–sea integrated 6G system is envisioned to support various new applications with very diverse requirements in terms of quality of service and security. Due to the open nature of the wireless channel, highly dynamic network topology
-
Modeling and analysis of crosstalk-avoided and crosstalk-aware approaches in spectrally-spatially elastic optical networks Comput. Netw. (IF 5.6) Pub Date : 2024-02-16 Imran Ahmed, Eiji Oki, Bijoy Chand Chatterjee
Inter-core crosstalk (Ic-Xt) and inter-mode crosstalk (Im-Xt) occur during the transmission of optical signals through multi-core multi-mode fibers in spectrally-spatially elastic optical networks (SS-EONs), which degrade the signal quality. Xt-Avoided (Xt-Av) and Xt-Aware (Xt-Aw) approaches, respectively, are used in SS-EONs for dealing with Ic-Xt and Im-Xt. From the network deployment perspective
-
Multi-domain collaborative two-level DDoS detection via hybrid deep learning Comput. Netw. (IF 5.6) Pub Date : 2024-02-15 Huifen Feng, Weiting Zhang, Ying Liu, Chuan Zhang, Chenhao Ying, Jian Jin, Zhenzhen Jiao
In this paper, we investigate the problem of multiple network domains being threatened by Distributed Denial-of-Service (DDoS) attacks, in which a DDoS attack detection scheme is constructed based on the Software Defined Networks (SDN) hierarchical distributed control plane architecture. Specifically, we propose a two-level detection framework for collaborative DDoS attack detection in multi-domain
-
Using Centrality Based Topology Control for FANET Survivability Against Jamming Comput. Netw. (IF 5.6) Pub Date : 2024-02-15 T. Tolga Sarı, Gökhan Seçinti
Flying Ad Hoc Networks (FANETs) provide connectivity in extreme environments such as battle zones and disaster areas. Since these networks operate without infrastructure, they must calculate routes on the fly. Unfortunately, as each e2e link selfishly chooses the shortest path for its flow, they also tend to overwhelm geographically central nodes, making these nodes the bottleneck for all flows. On
-
Stochastic modeling of enhancing energy efficiency for HAP in HAP-LEO systems using Markov regenerative process Comput. Netw. (IF 5.6) Pub Date : 2024-02-15 Raina Raj
The sixth-generation (6G) communication systems heavily rely on space-air-terrestrial networks (SAT), which integrate high-altitude platforms (HAPs) and low Earth orbit (LEO) satellites. LEO satellites play a crucial role in ensuring global coverage and supporting a large number of users, while HAPs are strategically deployed to cover regions with high demand, providing a more reliable communication
-
Hybrid learning based service migration for cost minimization with deadlines in multi-user mobile edge computing systems Comput. Netw. (IF 5.6) Pub Date : 2024-02-15 Hao Yu, Qiang Zhang
Mobile edge computing, a new computing model, aims to reduce network latency and improve user experience by placing computing resources closer to the users. However, when users move away from the current service areas, the quality of services will decline. To guarantee the quality of services, service migration technique is proposed and studied. Due to the wireless resource contention among users,
-
Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments Comput. Netw. (IF 5.6) Pub Date : 2024-02-15 Karol Rzepka, Przemysław Szary, Krzysztof Cabaj, Wojciech Mazurczyk
At present, Internet of Things devices are revolutionizing and impacting increasingly more areas of our daily lives. However, there remain doubts related to the lack of sufficient security in the IoT ecosystem. As such devices have limitations in terms of resources such as computational power and batteries, adding security mechanisms is often perceived as an unnecessary burden, slowing the further
-
A federated learning approach to QoS forecasting in cellular vehicular communications: Approaches and empirical evidence Comput. Netw. (IF 5.6) Pub Date : 2024-02-14 Nehal Baganal-Krishna, Ralf Lübben, Eirini Liotou, Konstantinos V. Katsaros, Amr Rizk
QoS forecasting for cellular vehicular communications allows cooperative, connected and automated mobility applications to tailor their behavior to the expected communication conditions on the road. In a nutshell, vehicles may, for example, execute cooperative maneuvers if the communication quality of service is only above a certain quantitative level whereas if not they revert to the individual autonomous