-
On incentivizing resource allocation and task offloading for cooperative edge computing Comput. Netw. (IF 5.6) Pub Date : 2024-04-20 Weibo Chu, Xinming Jia, Zhiwen Yu, John C.S. Lui, Yi Lin
Cooperative edge computing serves as an effective solution to provide reliable and elastic edge computing services through pooling geographically proximate edge resources and efficiently allocating them to users. The incentive mechanism is critical for realizing cooperative edge computing. In this paper, we propose a virtual machine (VM) or container based resource allocation scheme and two market-based
-
Time-triggered scheduling of mixed-critical flows at end-system in asynchronous AFDX avionic network Comput. Netw. (IF 5.6) Pub Date : 2024-04-17 Oana Hotescu, Katia Jaffrès-Runser, Jean-Luc Scharbarg
Avionics Full-DupleX (AFDX) is a switched Ethernet-based network used in modern commercial airplanes for the transmission of command and control avionics flows. These critical flows require deterministic guarantees leading to a lightly loaded network. Aircraft manufacturers envision to carry additional non avionics flows (i.e. video, audio, service) to take advantage of the spare bandwidth. However
-
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT Comput. Netw. (IF 5.6) Pub Date : 2024-04-17 Axin Xiang, Hongfeng Gao, Youliang Tian, Linjie Wang, Jinbo Xiong
Internet of Medical Things (IoMT) provides real-time data collection and access services to medical entities by connecting their devices to Internet. However, within such a complex architecture, achieving patient-centric data access still presents trustworthiness challenges of transmission security and usage reliability. Ciphertext-policy attribute-based encryption (CP-ABE) and blockchain are both
-
ML-based inter-slice load balancing control for proactive offloading of virtual services Comput. Netw. (IF 5.6) Pub Date : 2024-04-16 Felipe S. Dantas Silva, Sérgio N. Silva, Lucileide M.D. da Silva, Ayuri Bessa, Samuel Ferino, Pablo Paiva, Marcos Medeiros, Lucas Silva, José Neto, Kevin Costa, Charles Santos, Eduardo Aranha, Allan Martins, Uirá Kulesza, Roger Immich, Augusto V. Neto, Ramon Fontes, Vicente Sousa, Marcelo A.C. Fernandes
In the new 5G networking digital era, Network Slicing is pivotal in delivering new visionary applications (e.g., holographic calls, tactical Internet, immersive video, and expanded reality) as well as driving new business models and market opportunities. To pave the way for delivering new applications, the Quality of Network-Slice Service (QoNSS) must be maintained over time, which requires intelligent
-
Provably secure fog-based authentication protocol for VANETs Comput. Netw. (IF 5.6) Pub Date : 2024-04-16 Syed Muhammad Awais, Wu Yucheng, Khalid Mahmood, Hafiz Muhammad Sanaullah Badar, Rupak Kharel, Ashok Kumar Das
The integration of fog computing and vehicular ad-hoc networks (VANETs) has become increasingly important due to advancements in cloud computing, Internet of Things (IoT) technologies, and intelligent transportation systems. However, ensuring secure communication in fog-based VANETs poses a significant challenge. To address this challenge, we propose a novel authenticated key agreement protocol that
-
Online optimal service caching for multi-access edge computing: A constrained Multi-Armed Bandit optimization approach Comput. Netw. (IF 5.6) Pub Date : 2024-04-16 Weibo Chu, Xiaoyan Zhang, Xinming Jia, John C.S. Lui, Zhiyong Wang
-
Modeling and evaluation of cooperative Vulnerable Road User protection schemes in realistic C-ITS environments Comput. Netw. (IF 5.6) Pub Date : 2024-04-13 Hamdan Hejazi, László Bokor
Vulnerable Road Users (VRUs) comprising pedestrians, cyclists, and motorcyclists are more susceptible to road traffic accidents and fatalities than other road users. Improving safety for vulnerable road users is a priority for many cities and governments, and various measures are being taken to reduce the risk of accidents and increase road safety. Advanced Cooperative Intelligent Transport Systems
-
DRLAR: A deep reinforcement learning-based adaptive routing framework for network-on-chips Comput. Netw. (IF 5.6) Pub Date : 2024-04-13 Shaocong Wang, Xiaoyun Zhang, Changhong Wang, Ke Wu, Cunlu Li, Dezun Dong
-
Joint optimization for computation offloading and 3C resource allocations over wireless-powered and NOMA-enabled multi-access MEC Comput. Netw. (IF 5.6) Pub Date : 2024-04-12 Pengjie Ai, Fei Wang
-
Low-latency Virtual Network function Scheduling Algorithm Based on Deep Reinforcement Learning Comput. Netw. (IF 5.6) Pub Date : 2024-04-10 Zhiwei Liu, Zhaogang Shu, Shuwu Chen, Yiwen Zhong, Jiaxiang Lin
This paper addresses the problem of mapping, scheduling, and routing of virtual network functions (VNF) on a service function chain (SFC) that is sensitive to latency in a virtual network. A scheduling algorithm for VNF is proposed, which aims to minimize the SFC rejection rate while taking into account VNF mapping, scheduling, and traffic routing during the scheduling process. To achieve this goal
-
Space-code division multiple access for broadband acoustic networks Comput. Netw. (IF 5.6) Pub Date : 2024-04-10 Zhengnan Li, Diego A. Cuji, Milica Stojanovic
We present an investigation into the design of an acoustic communication network, where multiple users are distributed across space and transmit and receive simultaneously in the same band to and from a common base station. Specifically, we focus on a system that utilizes orthogonal frequency division multiplexing as a modulation method, and allows users to transmit and receive in either synchronous
-
Congestion-aware Stackelberg pricing game in urban Internet-of-Things networks: A case study Comput. Netw. (IF 5.6) Pub Date : 2024-04-10 Jiahui Jin, Zhendong Guo, Wenchao Bai, Biwei Wu, Xiang Liu, Weiwei Wu
-
GlareShell: Graph learning-based PHP webshell detection for web server of industrial internet Comput. Netw. (IF 5.6) Pub Date : 2024-04-10 Pengbin Feng, Dawei Wei, Qiaoyang Li, Qin Wang, Youbing Hu, Ning Xi, Jianfeng Ma
-
Leveraging Data Plane Programmability to enhance service orchestration at the edge: A focus on industrial security Comput. Netw. (IF 5.6) Pub Date : 2024-04-09 Gaetano Francesco Pittalà, Lorenzo Rinieri, Amir Al Sadi, Gianluca Davoli, Andrea Melis, Marco Prandini, Walter Cerroni
The Edge Computing paradigm is increasingly gaining traction in modern telecommunication scenarios, as it enables the offloading of computational tasks from end devices to a variety of nodes located in close proximity to them. This approach is essential for meeting the ever-stricter Quality of Service requirements imposed by modern applications. Concurrently, the advent of Data Plane Programmability
-
Online task offloading algorithm based on multi-objective optimization caching strategy Comput. Netw. (IF 5.6) Pub Date : 2024-04-09 Mande Xie, Xiangquan Su, Hao Sun, Guoping Zhang
-
Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features Comput. Netw. (IF 5.6) Pub Date : 2024-04-08 Xiangbin Wang, Qingjun Yuan, Yongjuan Wang, Gaopeng Gou, Chunxiang Gu, Gang Yu, Gang Xiong
-
Robust and privacy-preserving federated learning with distributed additive encryption against poisoning attacks Comput. Netw. (IF 5.6) Pub Date : 2024-04-08 Fan Zhang, Hui Huang, Zhixiong Chen, Zhenjie Huang
-
Assessment of spatial isolation in Jailhouse: Towards a generic approach Comput. Netw. (IF 5.6) Pub Date : 2024-04-08 Jean de Bonfils Lavernelle, Pierre-François Bonnefoi, Benoît Gonzalvo, Damien Sauveron
-
Phishing URL detection generalisation using Unsupervised Domain Adaptation Comput. Netw. (IF 5.6) Pub Date : 2024-04-06 Fariza Rashid, Ben Doyle, Soyeon Caren Han, Suranga Seneviratne
-
Diver-robot communication dataset for underwater hand gesture recognition Comput. Netw. (IF 5.6) Pub Date : 2024-04-06 Igor Kvasić, Derek Orbaugh Antillon, Đula Nađ, Christopher Walker, Iain Anderson, Nikola Mišković
-
Reinforcement learning-based energy efficiency optimization for RIS-Assisted UAV hybrid uplink and downlink system Comput. Netw. (IF 5.6) Pub Date : 2024-04-06 Yi Wang, Yu Deng, Ling Kang, Fang Jiang, Fulin Jiang
-
QBDD: Quantum-resistant blockchain-assisted deep data deduplication protocol for vehicular crowdsensing system Comput. Netw. (IF 5.6) Pub Date : 2024-04-05 Junhao Li, Qiang Nong, Ziyu Liu
-
IRS-assisted energy efficient communication for UAV mobile edge computing Comput. Netw. (IF 5.6) Pub Date : 2024-04-04 Shuang Zhang, Huilong Jin, Pingkang Guo
-
SP-PoR: Improve blockchain performance by semi-parallel processing transactions Comput. Netw. (IF 5.6) Pub Date : 2024-04-04 Kaiyu Wang, Guangsheng Feng, Zhenzhou Ji, Zhiying Tu, Shufan He
-
AoI minimization of ambient backscatter-assisted EH-CRN with cooperative spectrum sensing Comput. Netw. (IF 5.6) Pub Date : 2024-04-04 Xiaoying Liu, Xiaodong Li, Kechen Zheng, Jia Liu
-
A congestion-aware user–cell association scheme to assist with traffic offloading in a three-tier heterogeneous network Comput. Netw. (IF 5.6) Pub Date : 2024-04-04 Xiaoli Han, Bo Hu
-
A multi-node attack scheme based on community partitioning in large scale infrastructure networks Comput. Netw. (IF 5.6) Pub Date : 2024-04-04 Beibei Li, Wei Hu
-
Black-box optimization for anticipated baseband-function placement in 5G networks Comput. Netw. (IF 5.6) Pub Date : 2024-04-04 Ligia Maria Moreira Zorello, Laurens Bliek, Sebastian Troia, Guido Maier, Sicco Verwer
-
CIPO: Efficient, lightweight and programmable packet scheduling Comput. Netw. (IF 5.6) Pub Date : 2024-04-03 Feng Guo, Shidong Sun, Junjie Hu, Ning Zhang, Zhiqiang Lv
-
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis Comput. Netw. (IF 5.6) Pub Date : 2024-03-30 Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, Kashif Nisar, Mohammed Azmi Al-Betar
-
MADRLOM: A Computation offloading mechanism for software-defined cloud-edge computing power network Comput. Netw. (IF 5.6) Pub Date : 2024-03-30 Yinzhi Guo, Xiaolong Xu, Fu Xiao
-
Scaling private proximity testing protocols for geofenced information exchange: A metropolitan-wide case study Comput. Netw. (IF 5.6) Pub Date : 2024-03-29 George Stergiopoulos, Panagiotis Kotzanikolaou, Konstantinos Adamos, Lilian Mitrou
Private Proximity Testing (PPT) protocols allow two entities to exchange location-and-time-specific information without any tangible breach of privacy between the two or any third-party intermediary such as a server or a service provider. Numerous PPT protocols have been proposed, however, to our knowledge, experimentation relies on simulations and algorithmic complexity analysis, without tests on
-
MEMENTO: A novel approach for class incremental learning of encrypted traffic Comput. Netw. (IF 5.6) Pub Date : 2024-03-28 Francesco Cerasuolo, Alfredo Nascita, Giampaolo Bovenzi, Giuseppe Aceto, Domenico Ciuonzo, Antonio Pescapè, Dario Rossi
-
HITLinQ: Improving path capacity through hybrid information-theoretic link scheduling in multi-hop wireless networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-28 Fei Ge, Liansheng Tan
-
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li
-
Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Hongmei Pei, Peng Yang, Weihao Li, Miao Du, Zhongjian Hu
-
DE-GNN: Dual embedding with graph neural network for fine-grained encrypted traffic classification Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Xinbo Han, Guizhong Xu, Meng Zhang, Zheng Yang, Ziyang Yu, Weiqing Huang, Chen Meng
-
Impact of power consumption in containerized clouds: A comprehensive analysis of open-source power measurement tools Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Carlo Centofanti, José Santos, Venkateswarlu Gudepu, Koteswararao Kondepu
-
Marvel: Towards Efficient Federated Learning on IoT Devices Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Libin Liu, Xiuting Xu
Federated learning has gained significant attention as a distributed machine learning paradigm, particularly due to its ability to preserve privacy by keeping data on IoT devices and only transmitting model parameters to the central server. However, existing federated learning systems face several challenges in their deployment. These challenges can be categorized into three main areas: data relation
-
A review on new technologies in 3GPP standards for 5G access and beyond Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Nhu-Ngoc Dao, Ngo Hoang Tu, Trong-Dai Hoang, Tri-Hai Nguyen, Luong Vuong Nguyen, Kyungchun Lee, Laihyuk Park, Woongsoo Na, Sungrae Cho
The world is witnessing the rapid development of commercial fifth-generation (5G) networks that enable diverse applications and services with enhanced mobile broadband, ultra-reliability, low latency, and massive connectivity performance. Technical specifications and requirements for 5G networks have been officially standardized by the Third Generation Partnership Project (3GPP) organization since
-
The implications of decentralization in blockchained federated learning: Evaluating the impact of model staleness and inconsistencies Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Francesc Wilhelmi, Nima Afraz, Elia Guerra, Paolo Dini
Blockchain promises to enhance distributed machine learning (ML) approaches such as federated learning (FL) by providing further decentralization, security, immutability, and trust, which are key properties for enabling collaborative intelligence in next-generation applications. Nonetheless, the intrinsic decentralized operation of peer-to-peer (P2P) blockchain nodes leads to an uncharted setting for
-
Redact4Trace: A solution for auditing the data and tracing the users in the redactable blockchain Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Jianwei Hu, Kaiqi Huang, Genqing Bian, Yanpeng Cui
With the introduction of the General Data Protection Regulation and the advent of the Blockchain 3.0 era, redactable blockchain have become a popular area of research. However, auditing harmful data on redactable blockchain has become an urgent problem to be solved to promote redactable blockchain. Moreover, tracing the identity of users who submit harmful data is a concerning problem that urgently
-
Task offloading optimization in mobile edge computing under uncertain processing cycles and intermittent communications Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Tao Deng, Zhanwei Yu, Di Yuan
Mobile edge computing (MEC) has emerged as a promising solution for addressing the growing computational demands by enabling cloud computing capabilities at the network edge. However, existing MEC models typically make assumptions of known processing cycles and uninterrupted communications, which are not practical in real-world scenarios. This paper aims to tackle the challenges posed by uncertainties
-
A receiver-driven transport protocol using differentiated algorithms for differential congestion in datacenters Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Xuhui Zhang, Qing Li, Feixue Han, Yong Jiang
With the continuous development of applications, data centers run application traffic from various service providers, and the requirements for data center networks are also increasing. Congestion control has always been a hot topic of discussion. Prevalent sender-driven transport protocols require adjusting their sending rate after network congestion occurs, and the long feedback delay makes them susceptible
-
WebRTC-QoE: A dataset of QoE assessment of subjective scores, network impairments, and facial & speech features Comput. Netw. (IF 5.6) Pub Date : 2024-03-27 Gülnaziye Bingöl, Simone Porcu, Alessandro Floris, Luigi Atzori
-
LiKey: Location-independent keystroke recognition on numeric keypads using WiFi signal Comput. Netw. (IF 5.6) Pub Date : 2024-03-26 Min Peng, Xianxin Fu, Haiyang Zhao, Yu Wang, Caihong Kai
As an application of wireless sensing, keystroke recognition can be used in a variety of scenarios, such as password protection and analog input for devices. Existing WiFi-based keystroke recognition systems have strong dependencies on environment and location. Once the environment or keyboard position changes, systems need to re-collect data and re-train the model, otherwise the performance will degrade
-
Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT Comput. Netw. (IF 5.6) Pub Date : 2024-03-26 Neeraj Kumar, Rifaqat Ali
-
FedSBS: Federated-Learning participant-selection method for Intrusion Detection Systems Comput. Netw. (IF 5.6) Pub Date : 2024-03-26 Helio N. Cunha Neto, Jernej Hribar, Ivana Dusparic, Natalia C. Fernandes, Diogo M.F. Mattos
-
Multisite gaming streaming optimization over virtualized 5G environment using Deep Reinforcement Learning techniques Comput. Netw. (IF 5.6) Pub Date : 2024-03-26 Alberto del Rio, Javier Serrano, David Jimenez, Luis M. Contreras, Federico Alvarez
-
Hierarchical aerial offload computing algorithm based on the Stackelberg-evolutionary game model Comput. Netw. (IF 5.6) Pub Date : 2024-03-22 Sungwook Kim
-
A comprehensive survey on digital twin for future networks and emerging Internet of Things industry Comput. Netw. (IF 5.6) Pub Date : 2024-03-22 Akram Hakiri, Aniruddha Gokhale, Sadok Ben Yahia, Nedra Mellouli
-
Hybrid cell handover strategy for O-RAN-based campus networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-22 Emin Bilir, Murtaza Cicioğlu, Ali Çalhan
-
Network sum-rate maximization for network-coded clustered uplink NOMA networks with SWIPT-enabled relays Comput. Netw. (IF 5.6) Pub Date : 2024-03-22 Mohammed W. Baidas, Ahmed M. AbdelGhaffar, Emad Alsusa
-
Computation offloading in NOMA-MEC-enabled aerial-vehicular networks exploiting mmWave capabilities Comput. Netw. (IF 5.6) Pub Date : 2024-03-21 Amara Umar, Syed Ali Hassan, Haejoon Jung, Sahil Garg, M. Shamim Hossain, Mohsen Guizani
In recent years, there has been a significant interest in ubiquitous coverage, high data rate connectivity, and mobile edge computing (MEC) as crucial services within the future sixth-generation (6G) wireless networks. These services are regarded as essential components, exemplifying the advancements anticipated in 6G technology. Nevertheless, the successful implementation of these services in MEC-enabled
-
A deep learning based dynamic bandwidth allocation method for XG-PON based mobile fronthaul for CRAN Comput. Netw. (IF 5.6) Pub Date : 2024-03-21 Garima, Vivekanand Jha, Rakesh Kumar Singh
-
A multipath scheduler based on cross-layer information for low-delay applications in 5G edge networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-21 Baosen Zhao, Wanghong Yang, Wenji Du, Yongmao Ren, Jianan Sun, Qinghua Wu, Xu Zhou
-
Energy efficient multipath routing in space division multiplexed elastic optical networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-20 Soheil Hosseini, Ignacio de Miguel, Noemí Merayo, Ramón de la Rosa, Rubén M. Lorenzo, Ramón J. Durán Barroso
-
Instant queue occupancy used for automatic traffic scheduling in data center networks Comput. Netw. (IF 5.6) Pub Date : 2024-03-19 Muhammad Shahid Iqbal, Chien Chen
-
Experimental assessment of a JANUS-based consensus protocol Comput. Netw. (IF 5.6) Pub Date : 2024-03-19 Emil Wengle, Elias Strandell Erstorp, Viktor Lidström, Damiano Varagnolo, Hefeng Dong
-
TbDd: A new trust-based, DRL-driven framework for blockchain sharding in IoT Comput. Netw. (IF 5.6) Pub Date : 2024-03-18 Zixu Zhang, Guangsheng Yu, Caijun Sun, Xu Wang, Ying Wang, Ming Zhang, Wei Ni, Ren Ping Liu, Andrew Reeves, Nektarios Georgalas