样式: 排序: IF: - GO 导出 标记为已读
-
SAT-Net: A staggered attention network using graph neural networks for encrypted traffic classification J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-11-15 Zhiyuan Li, Hongyi Zhao, Jingyu Zhao, Yuqi Jiang, Fanliang Bu
With the increasing complexity of network protocol traffic in the modern network environment, the task of traffic classification is facing significant challenges. Existing methods lack research on the characteristics of traffic byte data and suffer from insufficient model generalization, leading to decreased classification accuracy. In response, we propose a method for encrypted traffic classification
-
FCG-MFD: Benchmark function call graph-based dataset for malware family detection J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-11-07 Hassan Jalil Hadi, Yue Cao, Sifan Li, Naveed Ahmad, Mohammed Ali Alshara
Cyber crimes related to malware families are on the rise. This growth persists despite the prevalence of various antivirus software and approaches for malware detection and classification. Security experts have implemented Machine Learning (ML) techniques to identify these cyber-crimes. However, these approaches demand updated malware datasets for continuous improvements amid the evolving sophistication
-
Particle swarm optimization tuned multi-headed long short-term memory networks approach for fuel prices forecasting J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-11-07 Andjela Jovanovic, Luka Jovanovic, Miodrag Zivkovic, Nebojsa Bacanin, Vladimir Simic, Dragan Pamucar, Milos Antonijevic
Increasing global energy demands and decreasing stocks of fossil fuels have led to a resurgence of research into energy forecasting. Artificial intelligence, explicitly time series forecasting holds great potential to improve predictions of cost and demand with many lucrative applications across several fields. Many factors influence prices on a global scale, from socio-economic factors to distribution
-
Deep learning frameworks for cognitive radio networks: Review and open research challenges J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-11-06 Senthil Kumar Jagatheesaperumal, Ijaz Ahmad, Marko Höyhtyä, Suleman Khan, Andrei Gurtov
Deep learning has been proven to be a powerful tool for addressing the most significant issues in cognitive radio networks, such as spectrum sensing, spectrum sharing, resource allocation, and security attacks. The utilization of deep learning techniques in cognitive radio networks can significantly enhance the network’s capability to adapt to changing environments and improve the overall system’s
-
Joint VM and container consolidation with auto-encoder based contribution extraction of decision criteria in Edge-Cloud environment J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-11-05 Farkhondeh Kiaee, Ehsan Arianyan
In the recent years, emergence huge Edge-Cloud environments faces great challenges like the ever-increasing energy demand, the extensive Internet of Things (IoT) devices adaptation, and the goals of efficiency and reliability. Containers has become increasingly popular to encapsulate various services and container migration among Edge-Cloud nodes may enable new use cases in various IoT domains. In
-
Third layer blockchains are being rapidly developed: Addressing state-of-the-art paradigms and future horizons J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-28 Saeed Banaeian Far, Seyed Mojtaba Hosseini Bamakan
Undoubtedly, blockchain technology has emerged as one of the most fascinating advancements in recent decades. Its rapid development has attracted a diverse range of experts from various fields. Over the past five years, numerous blockchains have been launched, hosting a multitude of applications with varying objectives. However, a key limitation of blockchain-based services and applications is their
-
Robustness of multilayer interdependent higher-order network J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-24 Hao Peng, Yifan Zhao, Dandan Zhao, Bo Zhang, Cheng Qian, Ming Zhong, Jianmin Han, Xiaoyang Liu, Wei Wang
In real-world complex systems, most networks are interconnected with other networks through interlayer dependencies, forming multilayer interdependent networks. In each system, the interactions between nodes are not limited to pairwise but also exist in a higher-order interaction composed of three or more individuals, thus inducing a multilayer interdependent higher-order network (MIHN). First, we
-
PTTS: Zero-knowledge proof-based private token transfer system on Ethereum blockchain and its network flow based balance range privacy attack analysis J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-24 Goshgar Ismayilov, Can Özturan
Blockchains are decentralized and immutable databases that are shared among the nodes of the network. Although blockchains have attracted a great scale of attention in the recent years by disrupting the traditional financial systems, the transaction privacy is still a challenging issue that needs to be addressed and analyzed. We propose a Private Token Transfer System (PTTS) for the Ethereum public
-
Leveraging blockchain and federated learning in Edge-Fog-Cloud computing environments for intelligent decision-making with ECG data in IoT J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-19 Shinu M. Rajagopal, Supriya M., Rajkumar Buyya
Blockchain technology combined with Federated Learning (FL) offers a promising solution for enhancing privacy, security, and efficiency in medical IoT applications across edge, fog, and cloud computing environments. This approach enables multiple medical IoT devices at the network edge to collaboratively train a global machine learning model without sharing raw data, addressing privacy concerns associated
-
Controller load optimization strategies in Software-Defined Networking: A survey J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-16 Yong Liu, Yuanhang Ge, Qian Meng, Quanze Liu
In traditional networks, the static configuration of devices increases the complexity of network management and limits the development of network functions. Software-Defined Networking (SDN) employs controllers to manage switches, thereby simplifying network management. However, with the expansion of network scale, the early single controller architecture gradually became a performance bottleneck for
-
On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-14 Muhammad Sajjad Akbar, Zawar Hussain, Muhammad Ikram, Quan Z. Sheng, Subhas Chandra Mukhopadhyay
Fifth-generation (5G) wireless networks are likely to offer high data rates, increased reliability, and low delay for mobile, personal, and local area networks. Along with the rapid growth of smart wireless sensing and communication technologies, data traffic has increased significantly and existing 5G networks are not able to fully support future massive data traffic for services, storage, and processing
-
A deep reinforcement learning approach towards distributed Function as a Service (FaaS) based edge application orchestration in cloud-edge continuum J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-10 Mina Emami Khansari, Saeed Sharifian
Serverless computing has emerged as a new cloud computing model which in contrast to IoT offers unlimited and scalable access to resources. This paradigm improves resource utilization, cost, scalability and resource management specifically in terms of irregular incoming traffic. While cloud computing has been known as a reliable computing and storage solution to host IoT applications, it is not suitable
-
Joint optimization scheme for task offloading and resource allocation based on MO-MFEA algorithm in intelligent transportation scenarios J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-10 Mingyang Zhao, Chengtai Liu, Sifeng Zhu
With the surge of transportation data and diversification of services, the resources for data processing in intelligent transportation systems become more limited. In order to solve this problem, this paper studies the problem of computation offloading and resource allocation adopting edge computing, NOMA communication technology and edge(content) caching technology in intelligent transportation systems
-
IMUNE: A novel evolutionary algorithm for influence maximization in UAV networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-10 Jiaqi Chen, Shuhang Han, Donghai Tian, Changzhen Hu
In a network, influence maximization addresses identifying an optimal set of nodes to initiate influence propagation, thereby maximizing the influence spread. Current approaches for influence maximization encounter limitations in accuracy and efficiency. Furthermore, most existing methods are aimed at the IC (Independent Cascade) diffusion model, and few solutions concern dynamic networks. In this
-
RT-APT: A real-time APT anomaly detection method for large-scale provenance graph J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-10 Zhengqiu Weng, Weinuo Zhang, Tiantian Zhu, Zhenhao Dou, Haofei Sun, Zhanxiang Ye, Ye Tian
Advanced Persistent Threats (APTs) are prevalent in the field of cyber attacks, where attackers employ advanced techniques to control targets and exfiltrate data without being detected by the system. Existing APT detection methods heavily rely on expert rules or specific training scenarios, resulting in the lack of both generality and reliability. Therefore, this paper proposes a novel real-time APT
-
A comprehensive systematic review on machine learning application in the 5G-RAN architecture: Issues, challenges, and future directions J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-10-09 Mohammed Talal, Salem Garfan, Rami Qays, Dragan Pamucar, Dursun Delen, Witold Pedrycz, Amneh Alamleh, Abdullah Alamoodi, B.B. Zaidan, Vladimir Simic
The fifth-generation (5G) network is considered a game-changing technology that promises advanced connectivity for businesses and growth opportunities. To gain a comprehensive understanding of this research domain, it is essential to scrutinize past research to investigate 5G-radio access network (RAN) architecture components and their interaction with computing tasks. This systematic literature review
-
Android malware defense through a hybrid multi-modal approach J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-30 Asmitha K.A., Vinod P., Rafidha Rehiman K.A., Neeraj Raveendran, Mauro Conti
The rapid proliferation of Android apps has given rise to a dark side, where increasingly sophisticated malware poses a formidable challenge for detection. To combat this evolving threat, we present an explainable hybrid multi-modal framework. This framework leverages the power of deep learning, with a novel model fusion technique, to illuminate the hidden characteristics of malicious apps. Our approach
-
Performance enhancement of artificial intelligence: A survey J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-26 Moez Krichen, Mohamed S. Abdalzaher
The advent of machine learning (ML) and Artificial intelligence (AI) has brought about a significant transformation across multiple industries, as it has facilitated the automation of jobs, extraction of valuable insights from extensive datasets, and facilitation of sophisticated decision-making processes. Nevertheless, optimizing efficiency has become a critical research field due to AI systems’ increasing
-
Reducing cold start delay in serverless computing using lightweight virtual machines J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-24 Amirmohammad Karamzadeh, Alireza Shameli-Sendi
In recent years, serverless computing has gained considerable attention in academic, professional, and business circles. Unique features such as code development flexibility and the cost-efficient pay-as-you-go pricing model have led to predictions of widespread adoption of serverless services. Major players in the cloud computing sector, including industry giants like Amazon, Google, and Microsoft
-
A cooperative task assignment framework with minimum cooperation cost in crowdsourcing systems J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-21 Bo Yin, Zeshu Ai, Jun Lu, Ying Feng
Crowdsourcing provides a new problem-solving paradigm that utilizes the intelligence of crowds to solve computer-hard problems. Task assignment is a foundation problem in crowdsourcing systems and applications. However, existing task assignment approaches often assume that workers operate independently. In reality, worker cooperation is necessary. In this paper, we address the cooperative task assignment
-
Node and relevant data selection in distributed predictive analytics: A query-centric approach J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-19 Tahani Aladwani, Christos Anagnostopoulos, Kostas Kolomvatsos
Distributed Predictive Analytics (DPA) refers to constructing predictive models based on data distributed across nodes. DPA reduces the need for data centralization, thus, alleviating concerns about data privacy, decreasing the load on central servers, and minimizing communication overhead. However, data collected by nodes are inherently different; each node can have different distributions, volumes
-
Distributed enhanced multi-objective evolutionary algorithm based on decomposition for cluster analysis in wireless sensor network J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-19 Anita Panwar, Satyasai Jagannath Nanda
Conventional clustering algorithms do not recognize patterns and structures with contradicting objectives in large, distributed datasets. Distributed clustering leverages rapid processing capabilities to allow multiple nodes to work together. This paper proposes a Distributed clustering based on Multiobjective Evolutionary Algorithm by Decomposition (D-MOEA/d) to solve various multiobjective optimization
-
Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-18 Van-Tam Hoang, Yared Abera Ergu, Van-Linh Nguyen, Rong-Guey Chang
The advent of sixth-generation (6G) networks is expected to start a new era in mobile networks, characterized by unprecedented high demands on dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence (AI) is at the forefront of this progress, optimizing and enabling intelligence for essential 6G functions such as radio resource allocation, slicing, service offloading
-
An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-13 Ponjit Borgohain, Hiten Choudhury
5G-assisted Device to Device (D2D) communication can be broadly categorized into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The main challenge lies in ensuring secure communication in Out-of Coverage scenarios, as in this situation, neither of the two devices is within the 5G network’s coverage area. Although several researchers have developed authentication mechanisms
-
Exclusively in-store: Acoustic location authentication for stationary business devices J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-12 Sungbin Park, Changbae Seo, Xueqiang Wang, Yeonjoon Lee, Seung-Hyun Seo
Over the past decade, the adoption of Internet of Things (IoT) devices has greatly revolutionized the retail and commerce industries. However, these devices are vulnerable to attacks, such as theft, which raises significant security and privacy concerns for business assets. Securing such business-owned devices is challenging, particularly due to the business contexts that require not only authenticating
-
Generalized hierarchical coded caching J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-12 Juan Eloy Espozo-Espinoza, Manuel Fernández-Veiga, Francisco Troncoso-Pastoriza
Optimizing data traffic is a key concern in content distribution networks to reduce the bandwidth needed to serve the requested content to the final users. In this context, hierarchical coded caching has been proposed as an effective method for reducing traffic. The typical two-level scenario consists in a tree-like structure: on the first layer, a set of intermediate nodes or helpers with local caches
-
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-12 Xueshu Hong, Xingkong Ma, Shaoyong Li, Yiqing Cai, Bo Liu
In recent years, the website fingerprinting (WF) attack against the Tor anonymity system has become a hot research issue. The state-of-the-art WF studies have shown that the detection accuracy of websites is up to more than 95%. However, they are mainly conducted under the single-tab assumption, where each sample contains only one website traffic. The single-tab setting could not be realistic because
-
Distributed Fog computing system for weapon detection and face recognition J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-11 Héctor Martinez, Francisco J. Rodriguez-Lozano, Fernando León-García, Jose M. Palomares, Joaquín Olivares
Surveillance systems are very important to prevent situations where armed people appear. To minimize human supervision, there are algorithms based on artificial intelligence that perform a large part of the identification and detection tasks. These systems usually require large data processing servers. However, a high number of cameras causes congestion in the networks due to a large amount of data
-
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-11 Pedro R.X. do Carmo, Diego de Freitas Bezerra, Assis T. Oliveira Filho, Eduardo Freitas, Miguel L.P.C. Silva, Marrone Dantas, Beatriz Oliveira, Judith Kelner, Djamel F.H. Sadok, Ricardo Souza
This survey delves into the synergy between Digital Twin technology and Task Offloading within safety-critical sectors, offering a nuanced understanding of their integration, potential benefits, and associated challenges. By defining fundamental concepts and exploring real-world implementations, this study evaluates the impact of Digital Twin-Assisted Task Offloading on optimizing resource utilization
-
A survey on Ethereum pseudonymity: Techniques, challenges, and future directions J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-07 Shivani Jamwal, José Cano, Gyu Myoung Lee, Nguyen H. Tran, Nguyen Truong
Blockchain technology has emerged as a transformative force in various sectors, including finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin’s role as a decentralized payment system, Ethereum represents a notable application of blockchain, featuring Smart Contract functionality that enables the development and execution of decentralized applications (DApps). A
-
DeCa360: Deadline-aware edge caching for two-tier 360° video streaming J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-07 Tao Lin, Yang Chen, Hao Yang, Yuan Zhang, Bo Jiang, Jinyao Yan
Two-tier 360° video streaming provides a robust solution for handling inaccurate viewport prediction and varying network conditions. Within this paradigm, the client employs a dual-buffer mechanism consisting of a long buffer for panoramic basic-quality segments and a short buffer for high-quality tiles. However, designing an efficient edge caching strategy for two-tier 360° videos is non-trivial.
-
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-06 Yash Sharma, Anshul Arora
The popularity of the Android operating system has itself become a reason for privacy concerns. To deal with such malware threats, researchers have proposed various detection approaches using static and dynamic features. Static analysis approaches are the most convenient for practical detection. However, several patterns of feature usage were found to be similar in the normal and malware datasets.
-
A survey on fuzz testing technologies for industrial control protocols J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-06 Xiaoyan Wei, Zheng Yan, Xueqin Liang
The development of the industrial Internet of Things enables industrial control systems to become inter-networked and inter-connected, making them intelligent with high productivity. However, these systems are exposed to external environments and vulnerable to network attacks, which also suffer from internal vulnerabilities. Fuzz testing, in short fuzzing, is a technique to enhance the security of
-
Clone node detection in static wireless sensor networks: A hybrid approach J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-09-05 Muhammad Numan, Fazli Subhan, Mohd Nor Akmal Khalid, Wazir Zada Khan, Hiroyuki Iida
Wireless Sensor Networks (WSNs) security is a serious concern due to the lack of hardware protection on sensor nodes. One common attack on WSNs is the cloning attack, where an adversary captures legitimate nodes, creates multiple replicas, and reprograms them for malicious activities. Therefore, creating an efficient defense to mitigate this challenge is essential. Several witness node-based techniques
-
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-30 Cong Wang, Tong Zhou, Maode Ma, Yuwen Xiong, Xiankun Zhang, Chao Liu
Named Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible solution to perform identity authentication of mobile producers in NDNs. Identity authentication schemes in other networks are either weak in security or performance
-
Credit risk prediction for small and micro enterprises based on federated transfer learning frozen network parameters J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-30 Xiaolei Yang, Zhixin Xia, Junhui Song, Yongshan Liu
To accelerate the convergence speed and improve the accuracy of the federated shared model, this paper proposes a Federated Transfer Learning method based on frozen network parameters. The article sets up frozen two, three, and four layers network parameters, 8 sets of experimental tasks, and two target users for comparative experiments on frozen network parameters, and uses homomorphic encryption
-
An online cost optimization approach for edge resource provisioning in cloud gaming J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-30 Guoqing Tian, Li Pan, Shijun Liu
Cloud gaming (CG), as an emergent computing paradigm, is revolutionizing the gaming industry. Currently, cloud gaming service providers (CGSPs) begin to integrate edge computing with cloud to provide services, with the aim of maximizing gaming service revenue while considering the costs incurred and the benefits generated. However, it is non-trivial to maximize gaming service revenue, as future requests
-
Striking the perfect balance: Multi-objective optimization for minimizing deployment cost and maximizing coverage with Harmony Search J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-29 Quang Truong Vu, Phuc Tan Nguyen, Thi Hanh Nguyen, Thi Thanh Binh Huynh, Van Chien Trinh, Mikael Gidlund
In the Internet of Things (IoT) era, wireless sensor networks play a critical role in communication systems. One of the most crucial problems in wireless sensor networks is the sensor deployment problem, which attempts to provide a strategy to place the sensors within the surveillance area so that two fundamental criteria of wireless sensor networks, coverage and connectivity, are guaranteed. In this
-
Evolving techniques in cyber threat hunting: A systematic review J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-23 Arash Mahboubi, Khanh Luong, Hamed Aboutorab, Hang Thanh Bui, Geoff Jarrad, Mohammed Bahutair, Seyit Camtepe, Ganna Pogrebna, Ejaz Ahmed, Bazara Barry, Hannah Gately
In the rapidly changing cybersecurity landscape, threat hunting has become a critical proactive defense against sophisticated cyber threats. While traditional security measures are essential, their reactive nature often falls short in countering malicious actors’ increasingly advanced tactics. This paper explores the crucial role of threat hunting, a systematic, analyst-driven process aimed at uncovering
-
Energy efficient multi-user task offloading through active RIS with hybrid TDMA-NOMA transmission J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-22 Baoshan Lu, Junli Fang, Junxiu Liu, Xuemin Hong
In this paper, we address the challenge of minimizing system energy consumption for task offloading within non-line-of-sight (NLoS) mobile edge computing (MEC) environments. Our approach integrates an active reconfigurable intelligent surface (RIS) and employs a hybrid transmission scheme combining time division multiple access (TDMA) and non-orthogonal multiple access (NOMA) to enhance the quality
-
An expandable and cost-effective data center network J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-22 Mengjie Lv, Xuanli Liu, Hui Dong, Weibei Fan
With the rapid growth of data volume, the escalating complexity of data businesses, and the increasing reliance on the Internet for daily life and production, the scale of data centers is constantly expanding. The data center network (DCN) is a bridge connecting large-scale servers in data centers for large-scale distributed computing. How to build a DCN structure that is flexible and cost-effective
-
Zebra: A cluster-aware blockchain consensus algorithm J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-20 Ji Wan, Kai Hu, Jie Li, Yichen Guo, Hao Su, Shenzhang Li, Yafei Ye
The Consensus algorithm is the core of the permissioned blockchain, it directly affects the performance and scalability of the system. Performance is limited by the computing power and network bandwidth of a single leader node. Most existing blockchain systems adopt mesh or star topology. Blockchain performance decreases rapidly as the number of nodes increases. To solve this problem, we first design
-
Network quality prediction in a designated area using GPS data J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-18 Onur Sahin, Vanlin Sathya
This study introduces a groundbreaking method for predicting network quality in LTE and 5G environments using only GPS data, focusing on pinpointing specific locations within a designated area to determine network quality as either good or poor. By leveraging machine learning algorithms, we have successfully demonstrated that geographical location can be a key indicator of network performance. Our
-
A hybrid Bi-level management framework for caching and communication in Edge-AI enabled IoT J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-17 Samane Sharif, Mohammad Hossein Yaghmaee Moghaddam, Seyed Amin Hosseini Seno
The proliferation of IoT devices has led to a surge in network traffic, resulting in higher energy usage and response delays. In-network caching has emerged as a viable solution to address this issue. However, caching IoT data faces two key challenges: the transient nature of IoT content and the unknown spatiotemporal content popularity. Additionally, the use of a global view on dynamic IoT networks
-
Reliability-assured service function chain migration strategy in edge networks using deep reinforcement learning J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-14 Yilin Li, Peiying Zhang, Neeraj Kumar, Mohsen Guizani, Jian Wang, Konstantin Igorevich Kostromitin, Yi Wang, Lizhuang Tan
With the widespread adoption of edge computing and the rollout of 5G technology, the edge network is experiencing rapid growth. Edge computing enables the execution of certain computational tasks on edge devices, fostering more efficient resource utilization. However, the reliability of the edge network is constrained by its network connections. Network instability can significantly compromise service
-
CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-14 Ruijin Wang, Jinbo Wang, Xiong Li, Jinshan Lai, Fengli Zhang, Xikai Pei, Muhammad Khurram Khan
As a distributed learning paradigm, federated learning can be effectively applied to the decentralized system since it can resolve the “data island” problem. However, it is also vulnerable to serious privacy breaches. Although existing secure aggregation technique can address privacy concerns, they also incur significant additional computation and communication costs. To address these challenges, this
-
A blockchain transaction mechanism in the delay tolerant network J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-14 Lingling Zi, Xin Cong
Current blockchain systems have high requirements on network connection and data transmission rate, for example, nodes have to receive the latest blocks in time to update the blockchain, nodes have to immediately broadcast the generated block to other nodes for consensus, which restricts the blockchain to run only on real-time connection networks, but the existence of delay tolerant networks poses
-
A survey on security issues in IoT operating systems J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-06 Panjun Sun, Yi Wan, Zongda Wu, Zhaoxi Fang
The security issues of the core (operating systems) of the Internet of Things (IoT) are becoming increasingly urgent and prominent, this article conducts a systematic research and summary of the security of the current mainstream IoT operating system. Firstly, based on the architecture and applications functions of IoT devices, this article introduces the concept of operating system security, analyzes
-
Privacy-preserving federated learning for proactive maintenance of IoT-empowered multi-location smart city facilities J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-05 Zu-Sheng Tan, Eric W.K. See-To, Kwan-Yeung Lee, Hong-Ning Dai, Man-Leung Wong
The widespread adoption of the Internet of Things (IoT) and deep learning (DL) have facilitated a social paradigm shift towards smart cities, accelerating the rapid construction of smart facilities. However, newly constructed facilities often lack the necessary data to learn any predictive models, preventing them from being truly smart. Additionally, data collected from different facilities is heterogeneous
-
An efficient exact method with polynomial time-complexity to achieve [formula omitted]-strong barrier coverage in heterogeneous wireless multimedia sensor networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-05 Nguyen Thi My Binh, Huynh Thi Thanh Binh, Ho Viet Duc Luong, Nguyen Tien Long, Trinh Van Chien
Barrier coverage in Wireless Sensor Networks (WSNs) plays a pivotal role in surveillance and security applications. It serves as a fundamental mechanism for identifying and detecting potential intruders who endeavor to infiltrate a sensor barrier. Achieving -strong barrier coverage is a vital indicator of a WSN’s capability to detect unauthorized intrusions. This paper establishes efficient -strong
-
-
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-02 Mohamad Wazzeh, Mohamad Arafeh, Hani Sami, Hakima Ould-Slimane, Chamseddine Talhi, Azzam Mourad, Hadi Otrok
In the ever-changing world of technology, continuous authentication and comprehensive access management are essential during user interactions with a device. Split Learning (SL) and Federated Learning (FL) have recently emerged as promising technologies for training a decentralized Machine Learning (ML) model. With the increasing use of smartphones and Internet of Things (IoT) devices, these distributed
-
Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-02 Mahdi Alkaeed, Adnan Qayyum, Junaid Qadir
The metaverse is a nascent concept that envisions a virtual universe, a collaborative space where individuals can interact, create, and participate in a wide range of activities. Privacy in the metaverse is a critical concern as the concept evolves and immersive virtual experiences become more prevalent. The metaverse privacy problem refers to the challenges and concerns surrounding the privacy of
-
Designing transport scheme of 3D naked-eye system J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-08-02 Rong Zheng, Xiaoqin Feng, Fengyuan Ren
3D naked-eye is constructed from multi-stream as a typical representation of stereoscopic video. Its enormous data volume and stringent low-delay transport requirements pose significant challenges for high-quality real-time transport. Through analysis and experimental verification that current streaming media transport frameworks using the server–client or peer-to-peer scheme face difficulties when
-
DFier: A directed vulnerability verifier for Ethereum smart contracts J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-07-30 Zeli Wang, Weiqi Dai, Ming Li, Kim-Kwang Raymond Choo, Deqing Zou
Smart contracts are self-executing digital agreements that automatically enforce the terms between parties, playing a crucial role in blockchain systems. However, due to the potential losses of digital assets caused by vulnerabilities, the security issues of Ethereum smart contracts have garnered widespread attention. To address this, researchers have developed various techniques to detect vulnerabilities
-
MATE: A multi-agent reinforcement learning approach for Traffic Engineering in Hybrid Software Defined Networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-07-30 Yingya Guo, Mingjie Ding, Weihong Zhou, Bin Lin, Cen Chen, Huan Luo
Hybrid Software Defined Networks (Hybrid SDNs), which combines the robustness of distributed network and the flexibility of centralized network, is now a prevailing network architecture. Previous hybrid SDN Traffic Engineering (TE) solutions search an optimal link weight setting or compute the splitting ratios of traffic leveraging heuristic algorithms. However, these methods cannot react timely to
-
Fatriot: Fault-tolerant MEC architecture for mission-critical systems using a SmartNIC J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-07-29 Taejune Park, Myoungsung You, Jinwoo Kim, Seungsoo Lee
Multi-access edge computing (MEC), deploying cloud infrastructures proximate to end-devices and reducing latency, takes pivotal roles for mission-critical services such as smart grids, self-driving cars, and healthcare. Ensuring fault-tolerance is paramount for mission-critical services, as failures in these services can lead to fatal accidents and blackouts. However, the distributed nature of MEC
-
Anomalous state detection in radio access networks: A proof-of-concept J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-07-26 Michael Frey, Thomas Evans, Angela Folz, Mary Gregg, Jeanne Quimby, Jacob D. Rezac
Modern radio access networks (RANs) are both highly complex and potentially vulnerable to unauthorized security setting changes. A RAN is studied in a proof-of-concept experiment to demonstrate that an unauthorized network state is detectable at layers in the RAN architecture away from the source of the state setting. Specifically, encryption state is set at the packet data convergence protocol (PDCP)
-
A bandwidth delay product based modified Veno for high-speed networks: BDP-Veno J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-07-25 Subhra Priyadarshini Biswal, Sanjeev Patel
In recent years, we have seen a significant enhancement in the performance of standard Transmission Control Protocol (TCP) congestion control algorithms. The number of packet drops and high round-trip time (RTT) are indications of network congestion. Many congestion control mechanisms have been proposed to overcome the challenge of achieving increased throughput and reduced latency. We have reviewed
-
CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks J. Netw. Comput. Appl. (IF 7.7) Pub Date : 2024-07-25 Alain Bertrand Bomgni, Garrik Brel Jagho Mdemaya, Miguel Landry Foko Sindjoung, Mthulisi Velempini, Celine Cabrelle Tchuenko Djoko, Jean Frederic Myoupo
The Internet of Things (IoT) has emerged as a promising paradigm which facilitates the seamless integration of physical devices and digital systems, thereby transforming multiple sectors such as healthcare, transportation, and urban planning. This paradigm is also known as ad-hoc networks. IoT is characterized by several pieces of equipment called objects. These objects have different and limited capacities