Evaluation of TCP Congestion Control Algorithms with traffic control policies in a PEP-based geosynchronous satellite scenario
Much work has been done in recent years comparing TCP variants in many scenarios, including the satellite one. Some of these studies were carried out with the ns-2 and ns-3 simulators, which may give a good idea of the behavior of these TCP ...
Towards learning-based energy-efficient online coordinated virtual network embedding framework
Network virtualization is a highly effective technology for resource sharing within data centers, enabling the coexistence of multiple heterogeneous virtual networks in a shared substrate network, thus achieving resource multiplexing. The ...
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers
Modern technology advancements such as Software Defined Networking (SDN) have been employed in distinct scenarios such as cloud computing and wireless networks, and have made network administration simpler since it gives greater flexibility in ...
Graph neural network based robust anomaly detection at service level in SDN driven microservice system
Software-Defined Network (SDN) has been widely employed in data center networks to host various software systems such as microservice systems. A microservice system is constructed by a microservice architecture composed of dozens of services ...
Unavailability-aware allocation of backup resources considering failures of virtual and physical machines
Cloud service providers widely use virtual machines and bring various benefits for customers and themselves. The unavailability of virtual machines is a crucial performance indicator for cloud service quality. However, no previous works studied ...
Energy-efficient non-anchor channel allocation in NB-IoT cellular networks
In Narrowband Internet of Things (NB-IoT), a base station can provide multiple non-anchor channels to release the burden of anchor channels. NB-IoT devices can use non-anchor channels to execute data transmission to save energy. However, we ...
Walking on two legs: Joint service placement and computation configuration for provisioning containerized services at edges
With the development of edge computing and container virtualization, provisioning containerized services at network edges is proposed for high responsiveness and low wide area network (WAN) traffic. However, realizing its full potential faces ...
Programmable device deployment for efficient network function offloading
Network functions (NFs) play an important role in ensuring network security and performance. To improve the NF throughput performance, an emerging method is to offload NFs on programmable devices, bringing orders-of-magnitude improvements. A ...
Beyond Wi-Fi 7: Spatial reuse through multi-AP coordination
Wi-Fi 7, based on the IEEE 802.11be amendment, is designed to increase the maximum achievable throughput, expand the range of operating frequencies, and improve latency and jitter in worst-case scenario. In the context of the discussions to shape ...
Introducing packet-level analysis in programmable data planes to advance Network Intrusion Detection
Programmable data planes offer precise control over the low-level processing steps applied to network packets, serving as a valuable tool for analysing malicious flows in the field of intrusion detection. Albeit with limitations on physical ...
Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security
Unmanned Aerial Vehicles (UAVs) have evolved into a pivotal component of electronic devices deployed across a diverse array of sectors and industries in recent years. Novel concepts have been introduced to captivate the interest of investors, ...
Connecting Internet of Drones and Urban Computing: Methods, protocols and applications
This comprehensive survey explores the connection between the Internet of Drones (IoD) and Urban Computing (UC). Drones offer substantial benefits across diverse urban applications encompassing public safety, transportation management, delivery ...
Ransomware early detection: A survey
In recent years, ransomware attacks have exploded globally, and it has become one of the most significant cyber threats to digital infrastructure. Such attacks have been targeting ranging from individuals to critical infrastructure or large ...
Leveraging pervasive computing for ambient intelligence: A survey on recent advancements, applications and open challenges
The advent of pervasive computing and ambient intelligence has opened up new possibilities for the development of intelligent systems that can adapt to the needs of their users. This paper provides a comprehensive survey of recent advancements in ...
Interference management in 5G and beyond networks: A comprehensive survey
During the last decade, wireless data services have had an incredible impact on people’s lives in ways we could never have imagined. The number of mobile devices has increased exponentially and data traffic has almost doubled every year. ...
Decentralized and collaborative machine learning framework for IoT
- Martín González-Soto,
- Rebeca P. Díaz-Redondo,
- Manuel Fernández-Veiga,
- Bruno Fernández-Castro,
- Ana Fernández-Vilas
Decentralized machine learning has recently been proposed as a potential solution to the security issues of the canonical federated learning approach. In this paper, we propose a decentralized and collaborative machine learning framework ...
Highlights
- This paper introduces an algorithm for resource-limited devices in IoT deployments.
- Two incremental learning mechanisms are proposed: a full ILVQ and a hybrid approach.
- Two sharing protocols are proposed: a random and a performance-...