-
A novel approach of hierarchical compressive sensing in wireless sensor network using block tri-diagonal matrix clustering Comput. Commun. (IF 2.816) Pub Date : 2021-01-12 Prabha M.; Darly S.S.; B. Justus Rabi
Wireless Sensor Network (WSN) delivers an important contribution in evolving fields for example ubiquitous computing and ambient intelligence. Monitoring environment is the vital applications of WSN’s. Likewise, inherent energy restriction becomes a bottleneck for applications in WSNs. However, the node such as the sensor and receiver ingests high power when proceeding the data transmission. Also,
-
Singability-enhanced lyric generator with music style transfer Comput. Commun. (IF 2.816) Pub Date : 2021-01-14 Jia-Wei Chang; Jason C. Hung; Kuan-Cheng Lin
The lyrics generator should consider the context and the singability of the songs because every song expresses a story through the context of lyrics, and the lyrics should sound with the music well. Therefore, this study proposes a framework to generate the singable lyrics, and the context of lyrics should fit the given musical style. For the context, this study adopts the GPT-2 model which is powerful
-
5G heterogeneous network selection and resource allocation optimization based on cuckoo search algorithm Comput. Commun. (IF 2.816) Pub Date : 2021-01-20 Ning Ai; Bin Wu; Boyu Li; Zhipeng Zhao
In order to solve the problem of spectrum resource shortage and high-speed access in 5G network, the multi-agent system is embedded into the standard cuckoo algorithm, and the multi-agent cuckoo algorithm is proposed. Firstly, the spectrum information of network channel sharing available to users is obtained, and the cuckoo search algorithm is used to optimize under the condition of satisfying the
-
A delay-sensitive resource allocation algorithm for container cluster in edge computing environment Comput. Commun. (IF 2.816) Pub Date : 2021-01-20 Shaoyong Guo; Keqin Zhang; Bei Gong; Wenchen He; Xuesong Qiu
With the development of lightweight container virtualization technology, it becomes possible to quickly and efficiently deploy software in edge computing environments. When allocating resources to containers in edge nodes, end-to-end latency is an important performance indicator for evaluating strategies. However, it is often difficult to develop a delay model of the container cluster to obtain the
-
Addressing disasters in smart cities through UAVs path planning and 5G communications: A systematic review Comput. Commun. (IF 2.816) Pub Date : 2021-01-19 Zakria Qadir; Fahim Ullah; Hafiz Suliman Munawar; Fadi Al-Turjman
UAVs are increasingly incorporated in a wide range of domains such as disaster management and rescue missions. UAV path planning deals with finding the most optimal or shortest path for UAVs such that minimum energy and resources are utilized. This paper examines the path planning algorithms for UAVs through a literature survey conducted on 139 systematically retrieved articles published in the last
-
On deep reinforcement learning security for Industrial Internet of Things Comput. Commun. (IF 2.816) Pub Date : 2021-01-08 Xing Liu; Wei Yu; Fan Liang; David Griffith; Nada Golmie
The Industrial Internet of Things (IIoT), also known as Industry 4.0, empowers manufacturing and production processes by leveraging automation and Internet of Things (IoT) technologies. In IIoT, the information communication technologies enabled by IoT could greatly improve the efficiency and timeliness of information exchanges between both vertical and horizontal system integrations. Likewise, machine
-
An efficient data transmission scheme through 5G D2D-enabled relays in wireless sensor networks Comput. Commun. (IF 2.816) Pub Date : 2021-01-18 Pradip Kumar Barik; Chetna Singhal; Raja Datta
Energy-efficient data transmission is a key challenge in Wireless Sensor Networks (WSNs). Cluster heads (CHs) are often used to relay aggregated data from sensor nodes to a central base station (BS). However, the transmission range of such relay nodes is limited, necessitating multihop communication for forwarding data from edge relays to BS. Further, links may not be created due to the unavailability
-
Clustering-based feature subset selection with analysis on the redundancy-complementarity dimension Comput. Commun. (IF 2.816) Pub Date : 2021-01-16 Zhijun Chen; Qiushi Chen; Yishi Zhang; Lei Zhou; Junfeng Jiang; Chaozhong Wu; Zhen Huang
In the era of big data, dimensionality reduction plays an extremely important role in many fields driven by machine learning and data mining techniques. The existing information-theoretic feature selection algorithms generally reduce the dimension by selecting the features with maximum class-relevance and minimum redundancy, while relatively overlook the complementary correlation among features and
-
Radio Access Technology characterisation through object detection Comput. Commun. (IF 2.816) Pub Date : 2020-12-30 Erika Fonseca; Joao F. Santos; Francisco Paisana; Luiz A. DaSilva
Radio Access Technology (RAT) classification and monitoring are essential for efficient coexistence of different communication systems in shared spectrum. Shared spectrum, including operation in license-exempt bands, is envisioned in the fifth generation of wireless technology (5G) standards (e.g., 3GPP Rel. 16). In this paper, we propose a Machine Learning (ML) approach to characterise the spectrum
-
Enhancing mobile cloud with social-aware device-to-device offloading Comput. Commun. (IF 2.816) Pub Date : 2021-01-07 Xiaomei Zhang
Mobile cloud computing has been widely used to support the computation-intensive applications in mobile devices. Since cloud computing relies on the facilities like network infrastructures and cloud servers, the cloud service can be easily hampered by the limitation of these facilities in many cases. Therefore, researchers proposed the concept of device-to-device offloading to offload workload to nearby
-
Green communication for OFDMA cellular networks with multiple antennas Comput. Commun. (IF 2.816) Pub Date : 2021-01-08 İlhan Baştürk
The green communication which requires the maximum reduction of energy consumption has become a strong need for the new wireless system designs because of the massive increasing number of mobile subscriptions. Thus, in this paper, energy efficiency (EE) maximization problem is considered for multiple-input single-output orthogonal frequency division multiple access (MISO-OFDMA) cellular networks. The
-
A method of two-stage clustering learning based on improved DBSCAN and density peak algorithm Comput. Commun. (IF 2.816) Pub Date : 2021-01-06 Mingyang Li; Xinhua Bi; Limin Wang; Xuming Han
Density peak (DP) and density-based spatial clustering of applications with noise (DBSCAN) are the representative clustering algorithms on the basis of density in unsupervised learning. They are capable of clustering data of arbitrary shape as well as identifying noise samples in a potential data set. Notwithstanding, DP algorithm depends on the decision graph when selecting the centers, it is difficult
-
Systematic review on next-generation web-based software architecture clustering models Comput. Commun. (IF 2.816) Pub Date : 2020-12-24 Tianfu Yang; Zhiyong Jiang; Yanhong Shang; Monire Norouzi
Software architecture is the heart of web-based software systems determining its components and their connections. These days, fast release and quick delivery of next-generation software, which is the primary goal of the software industry, triggers an occurring error in the software development process. Therefore, recovery and metric measurement techniques are essential tools to assess the quality
-
A multilevel Bit Vector minimization method for fast online detection of conflicting flow entries in OpenFlow table Comput. Commun. (IF 2.816) Pub Date : 2020-12-15 Yau-Hwang Kuo; Jen-Sheng Tsai; TszKwong Leung
OpenFlow implements flow-based control over switches with improved network management performance. However, a packet may match more than one flow entry due to the intra-table dependency phenomenon among flow entries. Moreover, different packets may incur different conflicting flow entries under the intra-table dependency. Forwarding packets by the first-match scheme for prioritized flow entries may
-
Boosting performance for software defined networks from traffic engineering perspective Comput. Commun. (IF 2.816) Pub Date : 2020-12-23 Mohammed I. Salman; Bin Wang
Paths selection algorithms and rate adaptation objective functions are usually studied separately. In contrast, this paper evaluates some traffic engineering (TE) systems for software defined networking obtained by combining path selection techniques with average delay and load balancing, the two most popular TE objective functions. Based on TE simulation results, the best TE system suitable for software
-
An ultra light weight and secure RFID batch authentication scheme for IoMT Comput. Commun. (IF 2.816) Pub Date : 2020-12-19 Junbin Kang; Kai Fan; Kuan Zhang; Xiaochun Cheng; Hui Li; Yintang Yang
As an application of IoT technology in the healthcare industry, IoMT has higher security requirements than IoT while improving medical efficiency and reducing medical costs. How to ensure the safety of IoMT is a challenging task. In the implementation of IoMT, Radio-Frequency Identification (RFID) is a key technology for establishing an identity authentication system, which can efficiently identify
-
Flow length and size distributions in campus Internet traffic Comput. Commun. (IF 2.816) Pub Date : 2020-12-26 Piotr Jurkiewicz; Grzegorz Rzym; Piotr Boryło
The efficiency of flow-based networking mechanisms strongly depends on traffic characteristics and should thus be assessed using accurate flow models. For example, in the case of algorithms based on the distinction between elephant and mice flows, it is extremely important to ensure realistic flows’ length and size distributions. Credible models or data are not available in literature. Numerous works
-
Unified scheduling for predictable communication reliability in cellular networks with D2D Links Comput. Commun. (IF 2.816) Pub Date : 2020-12-24 Yuwei Xie; Hongwei Zhang; Pengfei Ren
Cellular networks with device-to-device (D2D) links are increasingly being explored for mission-critical industrial applications which require predictable communication reliability. With interference being a major source of packet loss, it is thus critical to control interference among concurrent transmissions in a predictable manner to ensure the required communication reliability. To this end, we
-
Designing the Tactile Support Engine to assist time-critical applications at the edge of a 5G network Comput. Commun. (IF 2.816) Pub Date : 2020-12-14 Christian Grasso; Karthik Eswar K.N.; Prabagarane Nagaradjane; Mridhula Ramesh; Giovanni Schembra
The fifth generation of communications networks (5G) is not an evolution of the previous generations, but will constitute a revolution. Not only it will allow improvement in terms of quality of existing services, but also will enable several new heterogeneous applications that are not feasible with the current networks. One of the most promising research direction in the context of 5G is the Tactile
-
A full-duplex MAC technique to improve spectrum-efficiency on 5G mobile wireless networks Comput. Commun. (IF 2.816) Pub Date : 2020-12-07 Lucas de Melo Guimarães; Jacir Luiz Bordim
Full-duplex (FD) communications shall play an important role on the next generation (5G) mobile wireless networks as they are expected to enhance spectrum usage and throughput. Unleashing the benefits of FD communications, however, requires a fitted design of medium access control (MAC) schemes. In spite of that, existing full-duplex MAC schemes are build upon the IEEE 802.11 which is designed to operate
-
Stochastic geometry approach towards interference management and control in cognitive radio network: A survey Comput. Commun. (IF 2.816) Pub Date : 2020-12-13 Samuel D. Okegbile; Bodhaswar T. Maharaj; Attahiru S. Alfa
Interference management and control in the cognitive radio network (CRN) is a necessity if the activities of primary users must be protected from excessive interference resulting from the activities of neighboring users. Hence, interference experienced in wireless communication networks has earlier been characterized using the traditional grid model. Such models, however, lead to non-tractable analyses
-
Improving transaction success rate in cryptocurrency payment channel networks Comput. Commun. (IF 2.816) Pub Date : 2020-12-13 Suat Mercan; Enes Erdin; Kemal Akkaya
Blockchain-based cryptocurrencies has received a substantial interest in the last decade as Blockchain can ensure trust among users without relying on third parties. However, cryptocurrency adoption for micro-payments has been limited due to slow confirmation of transactions and unforeseeable high fees, especially in the case of Bitcoin. To this end, creating off-chain payment channels between users
-
Edge computing assisted privacy-preserving data computation for IoT devices Comput. Commun. (IF 2.816) Pub Date : 2020-12-04 Gaofei sun; Xiaoshuang Xing; Zhenjiang Qian; Wei (Lisa) Li
Along with the ubiquitous deployment of IoT devices, requirements on sensing data computation and analysis increase rapidly. However, the traditional cloud-based architecture is no longer sustained the computation load from these tremendous IoT devices, which bring the paradox of delay tolerance and bandwidth insufficiency. Fortunately, the edge computing is emerged and incorporated with the IoT network
-
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication Comput. Commun. (IF 2.816) Pub Date : 2020-12-14 Yinghui Zhang; Axin Wu; Zhenwei Chen; Dong Zheng; Jin Cao; Xiaohong Jiang
The fifth generation (5G) mobile communication technologies significantly promote the development of attractive applications such as automatic driving and telemedicine due to its lower latency, higher data rate and massive connectivities. In addition, 5G network slices can be used to realize tailored transmission network according to users’ different requirements. Nevertheless, 5G still suffers from
-
A privacy and session key based authentication scheme for medical IoT networks Comput. Commun. (IF 2.816) Pub Date : 2020-12-01 Pankaj Kumar; Lokesh Chouhan
Due to rapid increase rate of smart medical devices, the existing security internet of things (IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the Secure Addressing and Mutual Authentication protocol (SAMA) scheme is proposed to protect the network from multiple attacks. The SAMA scheme uses the unique addressing and identification method to authenticates
-
Role recommender-RBAC: Optimizing user-role assignments in RBAC Comput. Commun. (IF 2.816) Pub Date : 2020-12-10 K. Rajesh Rao; Ashalatha Nayak; Indranil Ghosh Ray; Yogachandran Rahulamathavan; Muttukrishnan Rajarajan
In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on the role-based access control (RBAC) system. Hence, the security administrator needs to dynamically maintain the role assignments to users for optimizing user-role assignments. The manual updation of user-role assignments is prone to error and increases administrative workload.
-
Energy-efficient computation offloading for vehicular edge computing networks Comput. Commun. (IF 2.816) Pub Date : 2020-12-13 Xiaohui Gu; Guoan Zhang
-
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks Comput. Commun. (IF 2.816) Pub Date : 2020-12-08 Prabhat Kumar; Govind P. Gupta; Rakesh Tripathi
Internet of Medical Things (IoMT), an application of Internet of Things (IoT), is addressing countless limitation of traditional health-care systems such as quality of patient care, healthcare costs, shortage of medical staff and inadequate medical supplies in an efficient manner. With the use of the IoMT systems, there are unparalleled benefits that are enhancing the quality and efficiency of treatments
-
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art Comput. Commun. (IF 2.816) Pub Date : 2020-11-23 Praveen Kumar Malik; Rohit Sharma; Rajesh Singh; Anita Gehlot; Suresh Chandra Satapathy; Waleed S. Alnumay; Danilo Pelusi; Uttam Ghosh; Janmenjoy Nayak
-
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment Comput. Commun. (IF 2.816) Pub Date : 2020-12-07 Basudeb Bera; Ashok Kumar Das; Anil Kumar Sutrala
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or even damage the network reliability that can have direct
-
SD-CPC: SDN Controller Placement Camouflage based on stochastic game for Moving-target Defense Comput. Commun. (IF 2.816) Pub Date : 2020-12-10 Mohamed Samir; Mohamed Azab; Effat Samir
The modern paradigm of Software Defined Network (SDN) inspired the research community to develop more innovative and transformative solutions for large scale and complex crucial Cyber Physical Systems (CPS). However, the recent destructive attacks targeting such CPS applications, raised the need to initially secure and scale the core SDN network. These attacks may target the heart of SDN networks itself
-
Optimization scheme for intrusion detection scheme GBDT in edge computing center Comput. Commun. (IF 2.816) Pub Date : 2020-12-10 Ju-fu Cui; Hui Xia; Rui Zhang; Ben-xu Hu; Xiang-guo Cheng
Combination of edge computing technologies and machine learning help to put edge intelligence into practice. Industrial Internet of Things (IIoT) is one of its most typical applications. But this system can be easily attacked in the process of using edge computing center to process localized perception data. Intrusion detection technologies based on machine learning provide strong security for edge
-
Pricing-based interference management scheme in LTE-V2V communication with imperfect channel state information Comput. Commun. (IF 2.816) Pub Date : 2020-12-04 Zhixin Liu; Yongkang Wang; Yazhou Yuan; Kit Yan Chan
In this paper, an effective LTE-V2V (long-term-evolution vehicle-to-vehicle) communication system is studied, where the uplink channel of the cellular user equipment (CUE) is reused by the multiple V2V links. Considering the co-channel interference caused by channel reusing between CUE and V2V links, a pricing framework of interference management for V2V links and CUE is proposed. In the LTE-V2V communication
-
Long-term optimization for MEC-enabled HetNets with device–edge–cloud collaboration Comput. Commun. (IF 2.816) Pub Date : 2020-12-02 Long Chen; Jigang Wu; Jun Zhang
For effective computation offloading with multi-access edge computing (MEC), both communication and computation resources should be properly managed, considering the dynamics of mobile users such as the time-varying demands and user mobility. Most existing works regard the remote cloud server as a special edge server. However, service quality cannot be met when some of the edge servers cannot be connected
-
Class consistent and joint group sparse representation model for image classification in Internet of Medical Things Comput. Commun. (IF 2.816) Pub Date : 2020-11-26 Zan Gao; Yuchan Yang; Mohammad R. Khosravi; Shaohua Wan
The amount of data handled by Internet of Medical Things (IoMT) devices grows exponentially, which means higher exposure of sensitive data. The security and privacy of the data collected from IoMT devices, either during their transmission to a cloud or while stored in a cloud, are major unresolved matters. Automated human larynx carcinoma (HEp-2) cell classification is critical for medical diagnosis
-
Combined diffusion approximation–simulation model of AQM’s transient behavior Comput. Commun. (IF 2.816) Pub Date : 2020-11-26 Dariusz Marek; Adam Domański; Joanna Domańska; Tadeusz Czachórski; Jerzy Klamka; Jakub Szyguła
The article introduces an approach combining diffusion approximation and simulation ones. Furthermore, it describes how it can be used to evaluate active queue management (AQM) mechanisms. Based on the obtained queue distributions, the simulation part of the model decides on package losses and modifies the flow intensity sent by the transmitter. The diffusion is used to estimate queue distributions
-
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm Comput. Commun. (IF 2.816) Pub Date : 2020-11-26 Zheng Wang; Guangfu Li; Jia Ren
According to its planning scope, path planning for unmanned surface vehicle (USV) can be divided into global and local path planning. Many scholars have improved the classic algorithms, including grids method, visibility graph method, A* algorithm and artificial potential field method (APF), But the global planning algorithm still has outstanding problems such as long calculation time and large computational
-
Analysis of backlog and delay in downlink power-domain non-orthogonal multiple access wireless networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-21 Yunpei Chen; Qi Zhu; Chunyan Feng; Xiaohui Li
As important quality-of-service (QoS) performance indicators, backlog and delay in wireless networks must be in compliance with the requirement of low-latency and high-reliability scenarios. Non-orthogonal multiple access (NOMA) is a novel and key wireless technology for the next generation of mobile communications. Its potential impacts on backlog and delay deserve to be specially studied. Meanwhile
-
A provably secure authentication scheme for RFID-enabled UAV applications Comput. Commun. (IF 2.816) Pub Date : 2020-11-21 Prosanta Gope; Owen Millwood; Neetesh Saxena
Advantages of Physically Uncloneable Functions (PUFs) have led to appearing a substantial number of novel identification and authentication based systems such as Radio frequency identification (RFID), which is expected to replace the conventional bar-code identification system due to its advantages such as real-time recognition of a considerable number of objects. For example, RFID can be used to identify
-
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-28 Peng Feng; Yuebin Bai; Yuhao Gu; Jun Huang; Xiaolin Wang; Chang Liu
Spectrum sensing aims to sense the potential spectrum resources available in the cognitive radio environment. It is also the premise of spectrum management and spectrum sharing in cognitive radio systems. To perceive the primary user’s activity and make full use of spectrum holes, rapid detection of a broad frequency span is an essential part of cognitive radio technology. Reducing the observation
-
Do we need a contact tracing app? Comput. Commun. (IF 2.816) Pub Date : 2020-11-19 Leonardo Maccari; Valeria Cagno
The goal of this paper is to shed some light on the usefulness of a contact tracing smartphone app for the containment of the COVID-19 pandemic. We review the basics of contact tracing during the spread of a virus, we contextualize the numbers to the case of COVID-19 and we analyze the state of the art for proximity detection using Bluetooth Low Energy. Our contribution is to assess if there is scientific
-
Privacy-preserving compression model for efficient IoMT ECG sharing Comput. Commun. (IF 2.816) Pub Date : 2020-11-25 Ayman Ibaida; Alsharif Abuadbba; Naveen Chilamkurti
Electrocardiogram (ECG) signals are widely used in most remote IoMT systems. Continuous monitoring of patients is required, especially in a pandemic time where doctors recommend telemedicine. This means a massive amount of ECG data is generated, sent to cloud servers, and needs to be shared with legitimate professionals. Therefore, this paper proposes a novel privacy-preserving and efficient technique
-
Routing optimization with path cardinality constraints in a hybrid SDN Comput. Commun. (IF 2.816) Pub Date : 2020-11-17 Yingya Guo; Huan Luo; Zhiliang Wang; Xia Yin; Jianping Wu
The emergence of Software Defined Networking (SDN) increases the flexibility of routing and provides an efficient approach to balance network flows. Due to the economical and technical challenges in transiting to a full SDN-enabled network, a hybrid SDN, with a partial deployment of SDN switches in a traditional network, has been a prevailing network architecture. For a hybrid SDN, the routing flexibility
-
Quality of service provisioning through resource optimisation in heterogeneous cognitive radio sensor networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-18 Babatunde S. Awoyemi; Bodhaswar T. Maharaj
Recently, cognitive radio sensor networks (CRSN) have evolved as a result of the introduction of cognitive capabilities to conventional wireless sensor networks. In most CRSN designs, secondary users and/or sensor nodes are permitted, under certain constraints, to use the limited resources of a primary network. One major challenge with CRSN is how to optimally appropriate and use the limited resources
-
An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise Comput. Commun. (IF 2.816) Pub Date : 2020-11-05 Moonsu Jang; Donghyun Kim; Daehee Seo; Yongmin Ju; Seungho Ryu; Hyunsoo Yoon
The recent surge in the frequency and seriousness of cyber attacks is alarming and poses a critical threat against the stability of our society. Previously, most effort to mitigate cyber attacks has focused on the technical countermeasures. However, a number of recent cyber attacks showed the necessity of constantly offering proper massive Cyber Defense eXercise (CDX) to the workforce in a timely manner
-
Lightweight blockchain assisted secure routing of swarm UAS networking Comput. Commun. (IF 2.816) Pub Date : 2020-11-18 Jian Wang; Yongxin Liu; Shuteng Niu; Houbing Song
The prominent capacities of 5G New Radio (5G NR) cellular networking drive the rapid development of many fields. The ubiquitous implementations of 5G NR cellular networking also provide swarm Unmanned Aircraft System (UAS) networking the feasibility of scalable deployment and smart control. However, the conveniences derived from 5G NR also bring other vulnerabilities to swarm UAS networking. The advanced
-
Mobile network traffic pattern classification with incomplete a priori information Comput. Commun. (IF 2.816) Pub Date : 2020-11-21 Zhiping Jin; Zhibiao Liang; Yu Wang; Weizhi Meng
In complex networks systems like mobile edge infrastructures, real-time traffic classification according to application types is an enabling technique for network resource optimization and advanced security management. State-of-the-art schemes take advantage of machine learning techniques to train classification models based on behavioral characteristics of network traffic flows. Nonetheless, most
-
Privacy-preserving using homomorphic encryption in Mobile IoT systems Comput. Commun. (IF 2.816) Pub Date : 2020-11-04 Wang Ren; Xin Tong; Jing Du; Na Wang; Shan Cang Li; Geyong Min; Zhiwei Zhao; Ali Kashif Bashir
The data privacy concerns are increasingly affecting the Internet of things (IoT) and artificial intelligence (AI) applications, in which it is very challenging to protect the privacy of the underlying data. In recent, the advancements in the performances of homomorphic encryption (HE) make it possible to help protect sensitive and personal data in IoT applications using homomorphic encryption based
-
A segment-graph algorithm for two-objective wireless spectrum allocation in cognitive networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-09 Jian Gao; Chubing Guo; Mingfeng Pu; Xin Zhang; Ying Li; Jianshe Wu; Xin Yu
A segment-graph algorithm is provided for wireless spectrum allocation in cognitive networks based on the cooperation of the secondary users, which aim to maximize the utilization of the limited spectrum bands and minimize the total cost of all the secondary users to buy (or lease) the spectrum bands. The segment-graph of the complement graph of the original interference graph is defined. The proposed
-
A secure and lightweight authentication scheme for next generation IoT infrastructure Comput. Commun. (IF 2.816) Pub Date : 2020-11-05 Minahil Rana; Akasha Shafiq; Izwa Altaf; Mamoun Alazab; Khalid Mahmood; Shehzad Ashraf Chaudhry; Yousaf Bin Zikria
While the 6G/IoT transition is on the cards, the real advantage of this transition can be realized only if the user privacy and security are guaranteed. The smartcard and password based authentication protocols can help the transition in a rapid way. However, due to insecurities and/or heavy computation, many such protocols cannot cope with the dynamic requirements of future generation networks. Recently
-
An Energy Efficient and Reliable Routing Scheme to enhance the stability period in Wireless Body Area Networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-05 Farman Ullah; M. Zahid Khan; Mohammad Faisal; Haseeb Ur Rehman; Sohail Abbas; Foad S. Mubarek
Wireless Body Area Network (WBAN) is a wireless network of wearable sensing and computing devices connected through a wireless communication channel, thereby offering a plethora of enticing applications in the area of remote health monitoring, sports, and entertainment. However, WBANs nodes are highly resource-constrained; therefore, energy-efficient and reliable data transmission is very vital in
-
Joint routing and scheduling for large-scale deterministic IP networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-04 Jonatan Krolikowski; Sébastien Martin; Paolo Medagliani; Jérémie Leguay; Shuang Chen; Xiaodong Chang; Xuesong Geng
With the advent of 5G and the evolution of Internet protocols, industrial applications are moving from vertical solutions to general purpose IP-based infrastructures that need to meet deterministic Quality of Service (QoS) requirements. The IETF DetNet working group aims at providing an answer to this need with support for (i) deterministic worst-case latency and jitter, and (ii) zero packet loss for
-
Internet of Flying Things (IoFT): A Survey Comput. Commun. (IF 2.816) Pub Date : 2020-11-02 Sofiane Zaidi; Mohammed Atiquzzaman; Carlos T. Calafate
Unmanned Aerial Vehicles (UAVs) have recently received significant attention by the civilian and military community, mostly due to the fast growth of UAV technologies supported by wireless communications and networking. UAVs can be used to improve the efficiency and performance of the Internet of Things (IoT) in terms of connectivity, coverage, reliability, stability, etc. In particular, to support
-
RDP-based Lateral Movement detection using Machine Learning Comput. Commun. (IF 2.816) Pub Date : 2020-10-28 Tim Bai; Haibo Bian; Mohammad A. Salahuddin; Abbas Abou Daya; Noura Limam; Raouf Boutaba
Detecting cyber threats has been an on-going research endeavor. In this era, Advanced Persistent Threats (APTs) can incur significant costs for organizations and businesses. The ultimate goal of cybersecurity is to thwart attackers from achieving their malicious intent, whether it is credential stealing, infrastructure takeover, or program sabotage. Every cyber attack goes through several stages before
-
Sharing is Caring: A collaborative framework for sharing security alerts Comput. Commun. (IF 2.816) Pub Date : 2020-10-19 Muhammad Ajmal Azad; Samiran Bag; Farhan Ahmad; Feng Hao
Collaboration is a keystone of defense in the field of cybersecurity. A collaborative detection system allows multiple collaborators or service providers to share their security-incident-response data, in order to effectively identify and isolate stealthy malicious actors who hide their traffic under the umbrella of legitimate Internet data transmissions. The fundamental challenge in the design of
-
Market-based dynamic resource allocation in Mobile Edge Computing systems with multi-server and multi-user Comput. Commun. (IF 2.816) Pub Date : 2020-11-09 Xiaowen Huang; Wenjie Zhang; Jingmin Yang; Liwei Yang; Chai Kiat Yeo
Mobile Edge Computing (MEC) is critical to the development of the Internet of things (IoTs) and 5G networks. However, the computation and communication resources of edge servers are limited, so it is challenging to perform resource allocation especially when the competition among edge servers is also taken into consideration. In this paper, we propose a trading model to investigate both the computation
-
Multi-hop routing under short contact in delay tolerant networks Comput. Commun. (IF 2.816) Pub Date : 2020-11-02 Tuan Le
As technologies evolve, mobile devices are capable of storing, communicating, and disseminating large data files across the network. Communicating large data is particularly challenging in Delay Tolerant Networks because of lack of connectivity and short contacts among network nodes. To simplify the routing, existing works often ignore the data size and duration of a contact. That is, once transmitted
-
Spectrum-aware cross-layered routing protocol for cognitive radio ad hoc networks Comput. Commun. (IF 2.816) Pub Date : 2020-10-20 Rashmi Naveen Raj; Ashalatha Nayak; M. Sathish Kumar
Cognitive radio network has been proposed as a promising technology to satisfy the manifold requirements of future generation (5G) wireless system by intelligently accessing the underutilized channel of a primary user. However, due to the heterogeneity in channel propagation characteristics, intermittent availability of licensed channel, recurrent hand-offs, and need of a protection to primary users
-
Blockchain-based Mobility-aware Offloading mechanism for Fog computing services Comput. Commun. (IF 2.816) Pub Date : 2020-11-02 Wanchun Dou; Wenda Tang; Bowen Liu; Xiaolong Xu; Qiang Ni
Mobile users could offload some computations from the mobile devices to the nearby geo-distributed Fog servers which are provided by Fog computing infrastructure to release the computation workloads, and therefore improve quality of experience for themselves. However, mobile users may mistakenly offload their computations to the Fog servers which have been injected by some attackers, and these compromised
-
Result return aware offloading scheme in vehicular edge networks for IoT Comput. Commun. (IF 2.816) Pub Date : 2020-10-29 Wei Huang; Kaoru Ota; Mianxiong Dong; Tian Wang; Shaobo Zhang; Jinhuan Zhang
With the development of microprocessor technology, massive IoT devices are deployed in smart cities which promotes numerous supervisory control and data acquisition (SCADA) systems to accomplish the key issue. The emergence of computation intensive and delay sensitive applications makes it quite a challenge for IoT devices in SCADA systems with very weak computing capacity. Vehicular edge computing
Contents have been reproduced by permission of the publishers.