Optimal Energy-efficient Resource Allocation and Fault Tolerance scheme for task offloading in IoT-FoG Computing Networks
Due to technology development in the recent past, it is observed that an exponential growth in the usage of high speed intelligent devices which includes smart objects, smart home, smart vehicles etc. Therefore, for the efficient transmission ...
An efficient topology partitioning algorithm for system-level parallel simulation of mega satellite constellation communication networks
Satellite Internet, as an important component of the integrated space-ground information network, is a hot research hotspot nowadays. Many scholars have undertaken research in the areas of constellation networking design, network protocol design, ...
EPIoT: Enhanced privacy preservation based blockchain mechanism for internet-of-things
With the increasing popularity of the Internet of things (IoT) and giving the end users the opportunity of collecting and analyzing the data by these IoT devices give rise to ultimate privacy concern and is attracting significant attention ...
Collaborative computation offloading for scheduling emergency tasks in SDN-based mobile edge computing networks
Due to the growing demand for time-intensive tasks, several tasks coexist, some of which last for a long time or only occur once in a while, such as emergencies. Emergencies such as natural disasters, accidents or medical emergencies require ...
QoS-based resource allocation for uplink NOMA networks
Nowadays, several next-generation multiple access technologies are proposed, and non-orthogonal multiple access (NOMA) is one of the candidates. In NOMA systems, since the utilization of successive interference cancellation (SIC), the SIC order ...
Joint energy and spectral optimization in Heterogeneous Vehicular Network
With the latest developments in both the automotive and communications industries, especially concerning the emerging 5G networks, IoV, and the adoption of Vehicle-to-Everything (V2X) connectivity, there has been a shift towards the establishment ...
Reuse-based online joint routing and scheduling optimization mechanism in deterministic networks
Deterministic networks plan the entire network traffic and calculate the scheduling time to meet the critical traffic requirements of specific domains, enabling real-time and deterministic interaction of massive data. However, in dynamic ...
TEA-RFFI: Temperature adjusted radio frequency fingerprint-based smartphone identification
Recently, radio frequency fingerprints (RFFs) have been widely applied for smartphone identification, since RFFs are distinguishable and hard to imitate. Compared with other types of RFFs, carrier frequency offset (CFO) in Wi-Fi signals is more ...
κ-Coverage Reliability for Wireless Multihop Network incorporating Boundary Effect
Coverage is one of the crucial performance measures for Wireless Multihop Networks (WMN) and is widely explored by researchers. The coverage performance of the network indicates how effectively the deployed network is able to provide the required ...
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones
In recent years, the industry and research have cast great attention to the Internet of Drones (IoD), which is becoming progressively popular since it can bring a great convenience to various application scenarios, such as national map ...
Mitigating the impact of controller failures on QoS robustness for software-defined wide area networks
Emerging cloud services and applications pose different Quality of Service (QoS) requirements for the network, where Software-Defined Wide Area Networks (SD-WANs) play a crucial role in QoS provisioning by introducing network programmability into ...
MicroCM: A cloud monitoring architecture for microservice invocation
In the complex operating environment, it is difficult to find the root of the issue when there are some time-consuming or error performance issues when executing the request. Aiming at resolving the above challenge, this paper designs and ...
PETNet: Plaintext-aware encrypted traffic detection network for identifying Cobalt Strike HTTPS traffics
Cobalt Strike is the most prevalent attack tool abused by cyber-criminals to achieve command and control on victim hosts over HTTPS traffics. It appears in many ransomware attacks and espionage attacks, threatening public privacy and national ...
Highlights
- A wide and deep learning-based method to detect Cobalt Strike HTTPS traffic.
- Extracting the identity-agnostic handshake meta features in wide branch.
- Configuration-aware encoding of interaction between client–server in deep branch.
Scalable packet classification based on rule categorization and cross-producting
Packet classification performs multidimensional point location upon fields in packet headers to categorize packets into multiple forwarding classes based on pre-defined rules. It plays an important role for the data plane of software-defined ...
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments
Mobile Adhoc Network (MANET) is used in various real-time applications, such as e-voting, army tactical communication, health-care applications, disaster rescue, online message exchange, etc. However, source authentication and deniability are ...
An adaptive classification and updating method for unknown network traffic in open environments
In recent years, to address the classification problem of unknown traffic in open network environments, numerous deep learning (DL)-based classification techniques have been proposed. Among these techniques, the single threshold-based DL method ...
Unlocking QoS Potential: Integrating IoT services and Monte Carlo Control for heterogeneous IoT device management in gateways
The exponential surge in IoT devices has presented significant challenges in managing network traffic and maintaining Quality of Service (QoS) in IoT networks. To tackle these challenges, ongoing efforts are focused on developing innovative ...
A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet
An intelligent robotic surgical system, utilizing the capabilities of 6G-enabled Tactile Internet (TI) and blockchain technology, holds remarkable promise for providing remote healthcare services in real-time. This system has the potential to ...
Elastically accelerating lookup on virtual SDN flow tables for software-defined cloud gateways
In recent years, Software-Defined Networking has been gradually applied to cloud gateways to provide efficient, reliable and flexible data transmission services for various large-scale cloud platforms. However, massive concurrent accessing ...