Queuing models of links carrying streaming and elastic services
We consider an access link carrying data generated by streaming and elastic services requested by fixed or mobile end users, and subjected to an admission control (AC) algorithm. For the performance analysis of such link we develop a new queuing ...
Plug-and-play multi-dimensional attention module for accurate Human Activity Recognition
Unlike image data, Human Activity Recognition (HAR) data is collected through sensors placed on different parts of the body. Each sensor may have varying importance for different human actions. Attention mechanisms can dynamically identify the ...
Edge collaborative caching solution based on improved NSGA II algorithm in Internet of Vehicles
With the rapid development of the Internet of Vehicles technology and the continuous advancement of intelligent transportation, vehicle network traffic is growing exponentially. Traditional caching solutions transmit content through the core ...
Online resolution adaptation and resource allocation for edge-assisted video analytics
Real-time analytics on video data from mobile devices demands intensive computation resources for the application like traffic monitoring and anomaly detection. Leveraging edge computing allows for the offloading of computation-intensive tasks to ...
Optimistic online caching for batched requests
In this paper, we investigate ‘optimistic’ online caching policies, distinguished by their use of future request predictions derived, for example, from machine learning models. Traditional online optimistic policies, grounded in the Follow-The-...
Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0
EAP-OAUTH is a novel Extensible Authentication Protocol (EAP) method that integrates the OAuth 2.0 framework to provide a secure and flexible authentication mechanism for LANs and WLANs that implement the IEEE 802.1X framework. EAP-OAUTH ...
TbDd: A new trust-based, DRL-driven framework for blockchain sharding in IoT
- Zixu Zhang,
- Guangsheng Yu,
- Caijun Sun,
- Xu Wang,
- Ying Wang,
- Ming Zhang,
- Wei Ni,
- Ren Ping Liu,
- Andrew Reeves,
- Nektarios Georgalas
Integrating sharded blockchain with IoT presents a solution for trust issues and optimized data flow. Sharding boosts blockchain scalability by dividing its nodes into parallel shards, yet it is vulnerable to the 1% attacks where dishonest nodes ...
Network sum-rate maximization for network-coded clustered uplink NOMA networks with SWIPT-enabled relays
This paper considers network sum-rate maximization for network-coded clustered uplink non-orthogonal multiple-access (NOMA) networks with simultaneous wireless information and power transfer (SWIPT)-enabled relays. Specifically, the aim is to ...
Hybrid cell handover strategy for O-RAN-based campus networks
In recent years, the concept of Open Radio Access Network (O-RAN) has become a prominent and ongoing research area in mobile communications, as mobile operators strive to enhance the intelligence, efficiency, and vendor independence of their RAN (...
FedSBS: Federated-Learning participant-selection method for Intrusion Detection Systems
Federated Learning (FL) is a decentralized machine learning approach in which multiple participants collaboratively train a model. Participants keep data locally, train their local models, and aggregate them in a single global model in a ...
Deep reinforcement learning enhanced skeleton based pipe routing for high-throughput transmission in flying ad-hoc networks
Artificial Intelligence (AI) is a huge step towards the emergence of powerful and smart decision-makers which can optimally tune the network parameters. In this work, a novel idea of an intelligent pipe (iPipe) routing scheme for a network of ...
Energy efficient multipath routing in space division multiplexed elastic optical networks
- Soheil Hosseini,
- Ignacio de Miguel,
- Noemí Merayo,
- Ramón de la Rosa,
- Rubén M. Lorenzo,
- Ramón J. Durán Barroso
This paper introduces a novel dynamic multipath routing, modulation level, spatial and spectrum assignment algorithm for space division multiplexing (SDM) enabled elastic optical networks (EON) with the aim of minimizing the blocking probability ...
Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT
In recent years, Maritime Transportation Systems (MTS) have experienced significant advancements through the adoption of Internet of Things (IoT) technology. The introduction of 6G mobile networks has further expanded possibilities by offering ...
Online two-timescale service placement for time-sensitive applications in MEC-assisted network: A TMAGRL approach
Mobile edge computing (MEC) integrated with the Network Functions Virtualization (NFV) technique has been regarded as a promising solution for flexible services provision and user service experience improvement. However, existing service ...
Blockchain solutions for trustworthy decentralization in social networks
The influence of blockchain on technology, especially in the field of finance, has brought about the age of cryptocurrencies and decentralized control, spreading its impact across various industries to ensure precision. As the trend moves towards ...
Highlights
- Blockchain’s impact on trust and privacy in digital societies.
- Decentralized networks as privacy-enhancing alternatives.
- Decentralized social networks, countering centralization risks.
- Analyzing trust models in decentralized ...
A comprehensive survey on digital twin for future networks and emerging Internet of Things industry
The rapid growth of industrial digitalization in the Industry 4.0 era is fundamentally transforming the industrial sector by connecting products, machines, and people, offering real-time digital models to allow self-diagnosis, self-optimization ...
Highlights
- We present a literature survey on Digital Twin for future IoT networks.
- We describe 5G digital twins research projects and tooling and use cases.
- We discuss standardization efforts in the realm of digital twins.
- we delve into ...
WebRTC-QoE: A dataset of QoE assessment of subjective scores, network impairments, and facial & speech features
In the realm of real-time communications, WebRTC-based multimedia applications are increasingly prevalent as these can be smoothly integrated within Web browsing sessions. The browsing experience is then significantly improved with respect to ...
DESiRED — Dynamic, Enhanced, and Smart iRED: A P4-AQM with Deep Reinforcement Learning and In-band Network Telemetry
- Leandro C. de Almeida,
- Washington Rodrigo Dias da Silva,
- Thiago C. Tavares,
- Rafael Pasquini,
- Chrysa Papagianni,
- Fábio L. Verdi
Active Queue Management (AQM) is a mechanism employed to alleviate transient congestion in network device buffers, such as routers and switches. Traditional AQM algorithms use fixed thresholds, like target delay or queue occupancy, to compute ...
Graphical abstractDisplay Omitted
Highlights
- AQM is employed to alleviate transient congestion in network devices.
- Traditional AQM algorithms use fixed thresholds, like target delay or queue occupancy, to compute random packet drop probabilities.
- Due to dynamic network ...
A measurement-based approach to analyze the power consumption of the softwarized 5G core
In light of the ever growing energy needs of the ICT sector, a value that is becoming increasingly important for a mobile network is its power consumption. However, the transition away from legacy network deployments tightly coupled with the ...
Experimental assessment of a JANUS-based consensus protocol
This paper proposes a distributed, JANUS-based protocol that enables an underwater acoustic network to reach consensus on arbitrary local opinions as numeric state variables. An envisioned scenario where nodes shall agree on parameters describing ...
Multisite gaming streaming optimization over virtualized 5G environment using Deep Reinforcement Learning techniques
The massive growth of live streaming, especially gaming-focused content, has led to an overall increase in global bandwidth consumption. Certain services see their quality diminished at times of peak consumption, degrading the quality of the ...
A multipath scheduler based on cross-layer information for low-delay applications in 5G edge networks
Virtual Reality (VR) applications that require extremely low delay and high image quality are widely used in online games and other 5G scenarios, becoming a hot research field in recent years. However, the limited bandwidth in 5G edge networks ...
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
The rapidly evolving landscape of network security, particularly in Software Defined Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection methods, especially in the face of TCP SYN DDoS attacks. These attacks ...
Instant queue occupancy used for automatic traffic scheduling in data center networks
Datacenter applications desire low latency for short messages to provide a better user experience. Therefore, one of the goals of datacenter networks is to minimize flow completion time (FCT), especially for short flows. Multiple scheduling ...
DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA
Today’s advancement in Vehicular Ad-hoc Networks (VANET) constitutes a cornerstone in ensuring traffic safety in Intelligent Transportation Systems (ITS). In this context, vehicle-to-vehicle (V2V) communications are a pivotal enabler for road ...
Highlights
- We propose a DID-based reputation scheme for VANET compliant with ETSI standards.
- We provide the research community with the first ETSI-compliant V2V dataset.
- We implement and evaluate DIVA in 5G-enabled scenarios proving its ...