-
Full/half-duplex unmanned aerial vehicles assisted wireless systems: Performance analysis and optimization Comput. Commun. (IF 6.0) Pub Date : 2024-04-15 Duc Thinh Vu, Ba Cao Nguyen, Nguyen Van Vinh, Taejoon Kim, Bao The Phung
In this paper, we explore the utilization of both full-duplex (FD) and half-duplex (HD) transmission modes on unmanned aerial vehicles (UAVs) to enhance wireless system performance. We consider two practical scenarios: one without a direct transmitter-user link and the other with such a link. For both cases, we derive mathematical expressions of outage probabilities (OPs) and throughputs of FD-UAV
-
Joint mode selection and resource allocation for cellular V2X communication using distributed deep reinforcement learning under 5G and beyond networks Comput. Commun. (IF 6.0) Pub Date : 2024-04-12 Shalini Yadav, Rahul Rishi
Vehicle-to-everything (V2X) communication via cellular networks is a promising technique for 5G and beyond networks. The cars interact directly with one another, as well as with the infrastructure and various vehicles on the road, in this mode. It enables the interchange of time-sensitive and safety-critical data. Despite these benefits, unstable vehicle-to-vehicle (V2V) communications, insufficient
-
Trajectory privacy protection method with smart contract-based query exchange in the Social Internet of Vehicles Comput. Commun. (IF 6.0) Pub Date : 2024-04-10 Lulu Liu, Ling Xing, Jianping Gao, Honghai Wu, Huahong Ma
-
A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm Comput. Commun. (IF 6.0) Pub Date : 2024-04-10 Zechao Liu, Tao Liang, Jiazhuo Lyu, Dapeng Lang
Recently, the rapid advancement of Industrial Internet of Things (IIoT) technology has led to the utilization of various communication protocols. Among these, the Message Queue Telemetry Transport (MQTT) protocol has become prevalent. Operating on a publish/subscribe model, MQTT’s popularity in IIoT because of simplicity, lightweight nature, and ease of implementation. However, traditional MQTT protocol
-
A robust and effective 3-factor authentication protocol for smart factory in IIoT Comput. Commun. (IF 6.0) Pub Date : 2024-04-06 Shihong Zou, Qiang Cao, Ruichao Lu, Chenyu Wang, Guoai Xu, Huanhuan Ma, Yingyi Cheng, Jinwen Xi
Smart factory, as an intelligent application of industrial internet of things (IIoT), significantly enhances the efficiency of industrial processes while also reducing resource waste. In a system where security is crucial, the user authentication mechanism is essentially designed to prevent a range of security issues, including production failures caused by illegal intrusions from hackers. To verify
-
Corrigendum to ‘A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver’ [Comput. Commun. 219 (2024) 173–181] Comput. Commun. (IF 6.0) Pub Date : 2024-04-05 Muhammad Aslam, Xianjun Jiao, Wei Liu, Michael Mehari, Thijs Havinga, Ingrid Moerman
-
Multi-UAVs path planning for data harvesting in adversarial scenarios Comput. Commun. (IF 6.0) Pub Date : 2024-04-04 Chengkai Zhou, Kadhim Mustafa Raad Kadhim, Xu Zheng
Unmanned aerial vehicles (UAVs) have been widely utilized for data harvesting in scenarios where reliable communication infrastructure is absent. A data requestor may first deploy a set of IoT devices into the monitoring regions like the disaster area or the battlefield, and deliver a group of UAVs to collaboratively collect data from these IoT devices. Constrained by the battery power and limited
-
Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV Comput. Commun. (IF 6.0) Pub Date : 2024-04-04 Chunhua Jin, Wenyu Qin, Zhiwei Chen, Kaijun Sun, Guanhua Chen, Jinsong Shan, Liqing Chen
Data confidentiality and availability in an open network environment are essential for Internet of Vehicles (IoV). Encryption technology can only ensure user privacy, but impedes the optimal use of vehicular data. As a solution, public key encryption with equality test (PKEET) is proposed. However, most existing PKEET schemes rely on the homogeneity of communication parties and reliability of algorithms
-
Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture Comput. Commun. (IF 6.0) Pub Date : 2024-04-04 P. SumanPrakash, K. Seshadri Ramana, Renzon Daniel CosmePecho, M. Janardhan, Meryelem Tania Churampi Arellano, J. Mahalakshmi, M. Bhavsingh, K. Samunnisa
Zero-touch architecture (ZTA) is one of the emerging cybersecurity components used to secure organizational resource. The primary pillars of ZTA is users, devices, networks, applications, and analytics. As part of this architecture, several components are used to secure resources, including the policy engine, the administrator, and the enforcement points on control and data planes. In addition, it
-
A dynamic data access control scheme for hierarchical structures in big data Comput. Commun. (IF 6.0) Pub Date : 2024-04-04 Xinxin Deng, Changgen Peng, Haoxuan Yang, Zongfeng Peng, Chongyi Zhong
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a promising solution to address the issues of data leakage and sharing in big data. When multiple files are shared, they often have hierarchical access relationships. However, existing hierarchical data CP-ABE schemes can only support simple hierarchical access structures. The limitation arises, necessitating the generation of multiple access
-
SDN-based detection and mitigation of DDoS attacks on smart homes Comput. Commun. (IF 6.0) Pub Date : 2024-04-03 Usman Haruna Garba, Adel N. Toosi, Muhammad Fermi Pasha, Suleman Khan
The adoption of the Internet of Things (IoT) has proliferated across various domains, where everyday objects like refrigerators and washing machines are now equipped with sensors and connected to the internet. Undeniably, the security of such devices, which were not primarily designed for internet connectivity, is of utmost importance but has been largely neglected. In this paper, we propose a framework
-
Low-cost fuzzing drone control system for configuration errors threatening flight safety in edge terminals Comput. Commun. (IF 6.0) Pub Date : 2024-04-03 Zhiwei Chang, Hanfeng Zhang, Yan Jia, Sihan Xu, Tong Li, Zheli Liu
With the wide deployment of edge-cloud computing, drones have drawn much attention to serving as edge nodes responsible for data collection. Numerous configuration parameters play a crucial role in regulating the attitude and altitude of the drone. If these parameters are misconfigured, drones will fall into abnormal flight states, such as trajectory deviation, and even crash to the ground. Previous
-
Game theory-based switch migration strategy for satellite networks Comput. Commun. (IF 6.0) Pub Date : 2024-04-01 Xu Yan, Jinyao Liu, Ligang Cong, Xiaoqiang Di, Nannan Xie, Ziyang Xing, Hui Qi
Software-Defined Networking (SDN) separates the control plane and data plane of the network, abstracting the underlying infrastructure of applications and network services and handing it over to the SDN controller for unified management. The introduction of SDN technology into satellite networks effectively addresses control challenges posed by dynamic topologies and intermittent inter-satellite links
-
Learning to optimize power allocation in cell-free massive MIMO networks with hybrid green energy Comput. Commun. (IF 6.0) Pub Date : 2024-03-30 Farzad Moradi, Vesal Hakami, Seyed Vahid Azhari
-
DRAMS: Double-RIS assisted multihop routing scheme for device-to-device communication Comput. Commun. (IF 6.0) Pub Date : 2024-03-26 Lakshmikanta Sau, Priyadarshi Mukherjee, Sasthi C. Ghosh
Reconfigurable intelligent surfaces (RISs) is a promising solution for enhancing the performance of multihop wireless communication networks. In this paper, we propose a double-RIS assisted multihop routing scheme for a device-to-device (D2D) communication network. Specifically, the scheme is dependent on the already deployed RISs and users in the surroundings. Besides the RISs, the emphasis of this
-
PrioMQTT: A prioritized version of the MQTT protocol Comput. Commun. (IF 6.0) Pub Date : 2024-03-26 Gaetano Patti, Luca Leonardi, Giuseppe Testa, Lucia Lo Bello
MQTT is an application layer protocol that, thanks to its simplicity and low overhead, is widely used in the Internet of Things (IoT) devices typically found in home automation and consumer applications. The MQTT properties make it an interesting option also for Industrial IoT (IIoT) applications. However, MQTT is not specifically devised for IIoT applications requiring low-latency and the support
-
LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid Comput. Commun. (IF 6.0) Pub Date : 2024-03-26 Zhong Wang, Funing Zhang, Anling Zhang, Jinyong Chang
In recent years, the data aggregation scheme was widely adopted in smart grids (SG) to protect data privacy while ensuring data availability. Meanwhile, asymmetric homomorphic encryption is a popular technique that guarantees data aggregation and accurate computing results. However, it often brings heavy computation overheads and costs, which increases burdens to SG. In order to lighten SG’s burden
-
Secrecy Enhancement of relay cooperative NOMA network based on user behavior Comput. Commun. (IF 6.0) Pub Date : 2024-03-21 Xin Song, Runfeng Zhang, Siyang Xu, Haiqi Hao, Jingyi Ma
-
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model Comput. Commun. (IF 6.0) Pub Date : 2024-03-19 Qingyi Zhu, Xuhang Luo, Yuhang Liu, Chenquan Gan, Yu Wu, Lu-Xing Yang
Despite the recent increase in mass media attention to mobile malware, it is still one of the major mobile security threats due to the lack of cybersecurity awareness. The compartment mode can divide the individuals into different states whose name is often a combination of the state names. To explore the impact of the security awareness level of users on susceptible and infected mobile devices, we
-
Detecting abnormal behaviors in smart contracts using opcode sequences Comput. Commun. (IF 6.0) Pub Date : 2024-03-18 Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai
With the fast growth of blockchain technology, blockchain as a decentralized distributed ledger technology has become more widely used and is gradually changing our way of life. But it also raises more and more security issues. As there are more and more smart contracts on the blockchain, and smart contracts cannot be changed once they are added to the blockchain, there is an opportunity for hackers
-
LoRa localisation using single mobile gateway Comput. Commun. (IF 6.0) Pub Date : 2024-03-16 Khondoker Ziaul Islam, David Murray, Dean Diepeveen, Michael G.K. Jones, Ferdous Sohel
Effective use of GPS and mobile networks for localisation in rangeland areas is constrained by their high power consumption and high deployment costs. Long-range (LoRa), a low-power wide area network (LPWAN) technology, can be employed to mitigate these challenges. In contrast to prior research where the prevalent approaches entail multiple gateways. This work proposes a valuable methodology focused
-
Fairness-oriented multicast routing for distributed interactive applications Comput. Commun. (IF 6.0) Pub Date : 2024-03-15 Ibirisol Fontes Ferreira, Maycon Leone Maciel Peixoto, Gustavo Bittencourt Figueiredo
Facing the challenges of network services on the edge, such as routing considering Quality of Service, is a crucial issue for current networking research efforts. Multicast routing is an essential technique for delivering routing services at a high level of optimization from the perspective of operators and application providers when there are user groups. Furthermore, routing that considers latency
-
Covert communication in hybrid microwave/mmWave UAV-enabled systems with transmission mode selection Comput. Commun. (IF 6.0) Pub Date : 2024-03-15 Wenhao Zhang, Ji He, Yulong Shen, Xiaohong Jiang
This paper investigates the covert communication in an air-to-ground (A2G) system, where a UAV (Alice) can adopt the omnidirectional microwave (OM) or directional mmWave (DM) transmission mode to transmit covert data to a ground user (Bob) while suffering from the detection of an adversary (Willie). For both the OM and DM modes, we first conduct theoretical analysis to reveal the inherent relationship
-
Benchmarking methodology for IPv4aaS technologies: Comparison of the scalability of the Jool implementation of 464XLAT and MAP-T Comput. Commun. (IF 6.0) Pub Date : 2024-03-15 Gábor Lencse, Ádám Bazsó
-
A novel hardware efficient design for IEEE 802.11ax compliant OFDMA transceiver Comput. Commun. (IF 6.0) Pub Date : 2024-03-15 Muhammad Aslam, Xianjun Jiao, Wei Liu, Michael Mehari, Thijs Havinga, Ingrid Moerman
The introduction of Multi User (MU) communication in IEEE 802.11ax in the frequency domain via MU Orthogonal Frequency Division Multiple Access (MU-OFDMA) and in the spatial domain via MU Multiple Input Multiple Output (MU-MIMO) enables the Access Point (AP) to serve up to 128 Stations (STAs) in a schedule. However, the MU functionality poses new challenges in the chip design. Existing MU Transceivers
-
Automated aerial assessment for seamless adaptive adhoc restoration in partially collapsed network Comput. Commun. (IF 6.0) Pub Date : 2024-03-13 Vipin Kumar Pandey, Suddhasil De, Sukumar Nandi
-
Physical layer security analysis for RIS-aided NOMA systems with non-colluding eavesdroppers Comput. Commun. (IF 6.0) Pub Date : 2024-03-12 Anh-Tu Le, Tran Dinh Hieu, Tan N. Nguyen, Thanh-Lanh Le, Sang Quang Nguyen, Miroslav Voznak
Within the realm of sixth-generation (6G) wireless systems, there exist two primary imperatives: establishing massive connections and ensuring robust data transmission security. Therefore, this paper delves into the realm of physical layer security (PLS) within the context of a reconfigurable intelligent surface (RIS)-assisted Non-Orthogonal Multiple Access (NOMA) network coupled with the Internet
-
Multi-round transmission and contention protocol in WLANs with multi-packet reception Comput. Commun. (IF 6.0) Pub Date : 2024-03-12 Victor Sandoval-Curmina, Aldo G. Orozco-Lugo, Ramon Parra-Michel, Mauricio Lara
Nowadays, there are many scenarios in Wi-Fi networks where many devices compete for network access via an Access Point to transmit their information. Thus, the ability to separate multiple packets sent simultaneously using advanced digital processing techniques in the physical layer, known as Multi-Packet Reception (MPR), has become crucial. As this feature may increase network throughput, medium access
-
Secrecy outage performance of MIMO-NOMA relay systems with MRT/MRC schemes Comput. Commun. (IF 6.0) Pub Date : 2024-03-11 Nguyen Le Cuong, Tran Manh Hoang, Pham Thanh Hiep
Non-orthogonal multiple access (NOMA) systems have indicated that they can provide higher spectral efficiency and secrecy capability compared with orthogonal multiple access (OMA) conventional systems. Therefore, the NOMA technique is expected to replace the OMA systems. Moreover, multiple-input multiple-output (MIMO) communications can achieve a high-level security thank to high channel gain between
-
Relay selection in Underwater Acoustic Sensor Networks for QoS-based cooperative communication using game theory Comput. Commun. (IF 6.0) Pub Date : 2024-03-11 Fang Ye, Hengyu Xu, Jingpeng Gao
Underwater Acoustic Sensor Networks (UASN) plays a crucial role in monitoring and transmitting environmental information for marine resource exploration. However, underwater communication faces significant challenges such as signal attenuation, noise interference, and unstable underwater environments. Moreover, with the deployment of a large number of nodes, inefficient resource allocation strategies
-
A survey on integrated computing, caching, and communication in the cloud-to-edge continuum Comput. Commun. (IF 6.0) Pub Date : 2024-03-05 Adyson Maia, Akram Boutouchent, Youcef Kardjadja, Manel Gherari, Ece Gelal Soyak, Muhammad Saqib, Kacem Boussekar, Idil Cilbir, Sama Habibi, Soukaina Ouledsidi Ali, Wessam Ajib, Halima Elbiaze, Ozgur Erçetin, Yacine Ghamri-Doudane, Roch Glitho
Cloud and edge computing have proposed different functionalities to enable multiple applications requiring different communication, computing, and caching (3C) resources. The upcoming futuristic applications (e.g., metaverse, holographic, and haptic communication) impose further stringent requirements (e.g., ultra-low latency, ultra-high reliability) on the infrastructure. These requirements call for
-
Comprehensive fault diagnosis in UAV-assisted sensor networks: A three-phase automated approach Comput. Commun. (IF 6.0) Pub Date : 2024-03-05 Sipra Swain, Pabitra Mohan Khilar, Biswa Ranjan Senapati, Rakesh Ranjan Swain
Ensuring operational safety in an automated working environment is a crucial requirement. In this article, we propose a technique for automated fault diagnosis in unmanned aerial vehicle-based sensor networks (UAV-sensor networks) aimed explicitly at the composite nature of different faults. Our technique consists of 3-stages: (1) UAVs collecting data from sensors and running a modified Z-score statistics
-
AP-assisted adaptive video streaming in wireless networks with high-density clients Comput. Commun. (IF 6.0) Pub Date : 2024-03-05 Wenjia Wu, Jiale Yuan, Sheng Ma, Ming Yang
Adaptive video streaming over wireless networks has experienced tremendous growth in past few years. In order to guarantee users’ quality of experience (QoE), adaptive bitrate (ABR) algorithms have been extensively studied. With the recent emergency of high-density Wi-Fi networks, these solutions no longer perform well. On the one hand, bitrate decisions respond slowly to high network fluctuations
-
A survey on privacy-preserving authentication protocols for secure vehicular communication Comput. Commun. (IF 6.0) Pub Date : 2024-03-01 Kartick Sutradhar, Beena G. Pillai, Ruhul Amin, Dayanand Lal Narayan
Secure vehicular communication is one of the challenges of vehicular technology. The main goal of vehicular ad hoc networks is to prevent road accidents and collisions by transferring traffic signals and essential information to vehicles securely. Secure vehicular communication relies significantly on authentication techniques. There are numerous privacy-preserving authentication techniques for secure
-
An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare Comput. Commun. (IF 6.0) Pub Date : 2024-02-28 Yihao Hu, Chunguang Huang, Hai Cheng
Smart healthcare overcomes the limitations of time and space, allowing users to access medical and health services anywhere and anytime, thus improving the quality and efficiency of these services. However, due to its excessive reliance on wireless public networks, smart healthcare faces challenges and issues related to communication security. As a result, authentication and key agreement are critical
-
Optimization and analysis of air-to-ground wireless link parameters for UAV mounted adaptable Radar Antenna Array Comput. Commun. (IF 6.0) Pub Date : 2024-02-28 Priti Mandal, Lakshi Prosad Roy, Santos Kumar Das
-
Online Learning to parallel offloading in heterogeneous wireless networks Comput. Commun. (IF 6.0) Pub Date : 2024-02-27 Yulin Qin, Jie Zheng, Hai Wang, Ling Gao, Yuhui Ma, Shuo Ji, Yi Liu, Jie Ren, Rui Cao, Yongxing Zheng
In the forthcoming era of 6G, the deployment of dense and diverse wireless networks equipped with edge servers makes parallel offloading a crucial technology for multiple access edge computing. However, the effectiveness of parallel offloading is constrained by heterogeneous edge servers (HES) and heterogeneous wireless networks (HWN). Existing solutions often assume that the link state of the wireless
-
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening Comput. Commun. (IF 6.0) Pub Date : 2024-02-24 Iacovos Ioannou, Prabagarane Nagaradjane, Pelin Angin, Palaniappan Balasubramanian, Karthick Jeyagopal Kavitha, Palani Murugan, Vasos Vassiliou
The increasing use of Internet of Things (IoT) gadgets in a daily rate has heightened security apprehension, particularly within the healthcare sector. In order to prevent the unauthorized disclosure of sensitive data, it is imperative for Internet of Things (IoT) systems to promptly and effectively respond to harmful activities. Nevertheless, the act of transferring data to distant cloud servers for
-
Privacy-preserving and verifiable data aggregation for Internet of Vehicles Comput. Commun. (IF 6.0) Pub Date : 2024-02-23 Fucai Zhou, Qiyu Wu, Pengfei Wu, Jian Xu, Da Feng
With the development of Internet of Vehicles (IoV), organizations or institutions are increasingly interested in aggregating vehicle perception data to perform data analysis. Nevertheless, the existing solutions are difficult to meet the comprehensive requirements of IoV scenario, such as low latency, privacy preservation and rich functions. Additionally, it is more challenging that the aggregation
-
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency Comput. Commun. (IF 6.0) Pub Date : 2024-02-23 Agung Mulyo Widodo, Hsing-Chung Chen
Low-power wide area (LPWA) technology, specifically Narrowband Internet of Things (NB-IoT), has emerged as a pivotal sixth-generation (6G) network technology, catering to the demands of massive-type communications (-MTC), extended battery life, wide range coverage, and high reliability. Despite its advancements, existing studies often fall short in simultaneously addressing energy efficiency, latency
-
A physical layer security scheme for 6G wireless networks using post-quantum cryptography Comput. Commun. (IF 6.0) Pub Date : 2024-02-21 Walid Abdallah
The sixth generation (6G) of mobile networks is poised to revolutionize communication capabilities with its infinite-like reach. These networks will feature an ultra-dense topology, accommodating a wide range of devices, from macro devices like satellites to nano-devices integrated within the human body. However, the extensive data traffic handled by 6G networks, a significant portion of which is sensitive
-
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication Comput. Commun. (IF 6.0) Pub Date : 2024-02-19 Zhenshen Ou, Xiaofei Xing, Siqi He, Guojun Wang
Data sharing has received much attention and research as an excellent way to unlock the value of data. Trusted data storage servers will participate in the data-sharing system to provide users with convenient data access and storage services. Currently, the vast majority of researchers design data-sharing systems based on centralized trusted authorities and key management centers, but they tend to
-
An attack-resistant target localization in underwater based on consensus fusion Comput. Commun. (IF 6.0) Pub Date : 2024-02-19 Chenlu Gao, Jing Yan, Xian Yang, Xiaoyuan Luo, Xinping Guan
Target localization has been regarded as one of the most important techniques of underwater sensor networks (USNs). However, the challenges posed by weak communication, inhomogeneous medium, and openness of underwater environment make localization more difficult. With consideration of the asynchronous clock, isogradient sound speed and forging attack, this paper presents a consensus fusion-based target
-
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0 Comput. Commun. (IF 6.0) Pub Date : 2024-02-16 Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Aisha-Hassan Abdalla Hashim, Azhar Abu Talib
Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven decision-making through machine-to-machine (M2M) communication, often facilitated by the 6LoWPAN standard. However, as a resource-constrained device, 6LoWPAN raises security and privacy concerns for M2M communications, necessitating efficient and lightweight authentication and key establishment (AKE)
-
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution Comput. Commun. (IF 6.0) Pub Date : 2024-02-15 Benjamín Arratia, Erika Rosas, Carlos T. Calafate, Juan-Carlos Cano, José M. Cecilia, Pietro Manzoni
Environmental intelligence aims to improve the decision-making process for high social and environmental value ecosystems. To this end, data are collected using different sensors to allow monitoring of different variables of interest. Typically, these ecosystems cover a large geographical area, with spots of low or no connectivity, preventing their monitoring in real time. In this work, we propose
-
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid Comput. Commun. (IF 6.0) Pub Date : 2024-02-15 Shuanggen Liu, Zhentao Liu, Jueqin Liang, Wanju Zhang, Zirong Heng
In the context of smart grids, bidirectional transmission of electricity information enables real-time electricity generation tailored to consumer needs. However, ensuring user privacy during data collection has emerged as a significant concern with the proliferation of data collection and transmission capabilities. Existing solutions such as group signature and pseudonym systems have limitations,
-
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products Comput. Commun. (IF 6.0) Pub Date : 2024-02-15 Jin Chen, Ziyang Guo, Liang Tan
With the development of the Industrial Internet of Things (IIoT), there will be more and more intelligent manufacturing products requiring remote monitoring, maintenance, management, and optimization. IIoT and intelligent manufacturing require precise control of the remote maintenance process of products. The traditional remote operation and maintenance network based on ordinary Internet technologies
-
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study Comput. Commun. (IF 6.0) Pub Date : 2024-02-14 Sebastian Böhm, Hartmut König
Wireless communication technologies and Internet of Things (IoT) applications are the main drivers of upcoming sustainable smart networks which require an effective resource management. The reduction of the transmission energy consumption and the efficient utilization of the available spectrum for wireless communication, for instance, have to be enabled by energy-efficient and cognitive IoT networks
-
Cyber–physical system architecture of autonomous robot ecosystem for industrial asset monitoring Comput. Commun. (IF 6.0) Pub Date : 2024-02-14 Hasan Kivrak, Muhammed Zahid Karakusak, Simon Watson, Barry Lennox
Driven by advancements in Industry 4.0, the Internet of Things (IoT), digital twins (DT), and cyber–physical systems (CPS), there is a growing interest in the digitalizing of asset integrity management. CPS, in particular, is a pivotal technology for the development of intelligent and interconnected systems. The design of a scalable, low-latency communication network with efficient data management
-
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC Comput. Commun. (IF 6.0) Pub Date : 2024-02-13 Oscar Amador, Maria Calderon, Manuel Urueña, Ignacio Soto
This paper evaluates the performance of the two ETSI non-area forwarding algorithms in the GeoNetworking specification: Greedy Forwarding and Non-Area Contention-Based Forwarding (CBF). Non-area forwarding occurs when a packet is sent to a geographical Destination Area from a node located outside of this area, e.g., when a vehicle wants to alert of hazardous events to other vehicles located in a distant
-
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure Comput. Commun. (IF 6.0) Pub Date : 2024-02-12 Mouna Rabhi, Roberto Di Pietro
In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. However, unlike any other solution, the tree is built using a probabilistic, fully distributed approach, without exchanging messages. The current tree-based ME
-
STI: A self-evolutive traffic identification system for unknown applications based on improved random forest Comput. Commun. (IF 6.0) Pub Date : 2024-02-12 Yulong Liang, Fei Wang, Shuhui Chen, Beier Chen, Yunjiao Bo
Artificial intelligence technology has proven potential and effective in traffic identification for network management and security. However, the accuracy of its identification is easily influenced by the massive unknown traffic. Given the fact of numerous unknown applications in real networks and even more as time goes by, a promising traffic identification system should have the ability to discover
-
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs Comput. Commun. (IF 6.0) Pub Date : 2024-02-12 Xiaolin Wu, Demin Li, Peng Wang, Qinghua Tang, Xuemin Chen
Vehicular Ad Hoc Networks (VANETs) present challenges in terms of access collision and merge collision, leading to increased access delay in end-to-end vehicle communication. How to address these issues remains an unsolved problem. In this paper, we propose EAPRAD (Enhancing Access Probability and Reducing Access Delay), a novel MAC (Media Access Control) protocol based on a Markov model. Our protocol
-
-
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware Comput. Commun. (IF 6.0) Pub Date : 2024-02-09 David Franco, Eder Ollora Zaballa, Mingyuan Zang, Asier Atutxa, Jorge Sasiain, Aleksander Pruski, Elisa Rojas, Marivi Higuero, Eduardo Jacob
Network softwarization has significantly evolved since programmable data planes became topical in academia and industry. Programming Protocol-Independent Packet Processors (P4) is a language to define packet forwarding behavior. Forwarding devices that are programmed with the P4 language support a flexible way to define headers, parse graphs, and data plane logic. However, extending the data plane
-
Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach Comput. Commun. (IF 6.0) Pub Date : 2024-02-07 Miguel García-Torres, Diego P. Pinto-Roa, Carlos Núñez-Castillo, Brenda Quiñonez, Gabriela Vázquez, Mauricio Allegretti, María E. García-Diaz
Nowadays, mobile service providers perceive the user experience as a reliable indicator of the quality associated to a service. Given a set of Quality of Service (QoS) factors, the aim is to predict the Quality of Experience (QoE), measured in terms of the Mean Opinion Score (MOS). Although this problem is receiving much attention, there are still some challenges that require more research in order
-
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture Comput. Commun. (IF 6.0) Pub Date : 2024-02-07 Hui Xie, Jun Zheng, Shengjun Wei, Changzhen Hu
Because of the inadequate network coverage and latency, Unmanned Aerial Vehicles (UAVs) may only move within the control range of the Ground Station (GS). The ability of UAVs to communicate with one another is also restricted by distance. These will make performing a task difficult. Simultaneously, data exchanged among UAVs as well as between UAVs and GSs encounter the threat of cyber attackers. This
-
When game theory meets satellite communication networks: A survey Comput. Commun. (IF 6.0) Pub Date : 2024-02-07 Weiwei Jiang, Haoyu Han, Miao He, Weixi Gu
Satellite communication networks have been considered an integral part of B5G and 6G networks to achieve global coverage and enhanced Internet services. However, the integration of satellite and terrestrial networks also brings many challenges, including the explosion of management complexity, the limited resource in satellite nodes, and the strategic behavior among network participants. To solve these
-
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication Comput. Commun. (IF 6.0) Pub Date : 2024-02-06 Liquan Chen, Yaqing Zhu, Suhui Liu, Hongtao Yu, Bing Zhang
The evolving UAV swarm flight environment exacerbates the difficulty of secure message delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to provide lightweight physical identities to UAV nodes. Nevertheless, the explicit storage of a private key within each UAV device invariably results in privacy leakage arising from physical hijacking. Therefore, to accomplish unified
-
Traffic matrix estimation using matrix-CUR decomposition Comput. Commun. (IF 6.0) Pub Date : 2024-02-05 Awnish Kumar, Ngangbam Herojit Singh, Suyel Namasudra, Ruben Gonzalez Crespo, Nageswara Rao Moparthi
Traffic Matrices (TMs) are the primary input for a multitude of network operations and management activities within a backbone network. TMs can be collected directly using monitoring tools but with an additional communication and processing overhead. Thus, TM estimation techniques gained prominence, where the objective is to obtain an estimate of the TM using easily available information without any