Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 244, Issue CMay 2024
Reflects downloads up to 22 Sep 2024Bibliometrics
Skip Table Of Content Section
Research Articles
research-article
Queuing models of links carrying streaming and elastic services
Abstract

We consider an access link carrying data generated by streaming and elastic services requested by fixed or mobile end users, and subjected to an admission control (AC) algorithm. For the performance analysis of such link we develop a new queuing ...

research-article
Plug-and-play multi-dimensional attention module for accurate Human Activity Recognition
Abstract

Unlike image data, Human Activity Recognition (HAR) data is collected through sensors placed on different parts of the body. Each sensor may have varying importance for different human actions. Attention mechanisms can dynamically identify the ...

research-article
Edge collaborative caching solution based on improved NSGA II algorithm in Internet of Vehicles
Abstract

With the rapid development of the Internet of Vehicles technology and the continuous advancement of intelligent transportation, vehicle network traffic is growing exponentially. Traditional caching solutions transmit content through the core ...

research-article
Online resolution adaptation and resource allocation for edge-assisted video analytics
Abstract

Real-time analytics on video data from mobile devices demands intensive computation resources for the application like traffic monitoring and anomaly detection. Leveraging edge computing allows for the offloading of computation-intensive tasks to ...

research-article
Optimistic online caching for batched requests
Abstract

In this paper, we investigate ‘optimistic’ online caching policies, distinguished by their use of future request predictions derived, for example, from machine learning models. Traditional online optimistic policies, grounded in the Follow-The-...

research-article
Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0
Abstract

EAP-OAUTH is a novel Extensible Authentication Protocol (EAP) method that integrates the OAuth 2.0 framework to provide a secure and flexible authentication mechanism for LANs and WLANs that implement the IEEE 802.1X framework. EAP-OAUTH ...

research-article
TbDd: A new trust-based, DRL-driven framework for blockchain sharding in IoT
Abstract

Integrating sharded blockchain with IoT presents a solution for trust issues and optimized data flow. Sharding boosts blockchain scalability by dividing its nodes into parallel shards, yet it is vulnerable to the 1% attacks where dishonest nodes ...

research-article
Network sum-rate maximization for network-coded clustered uplink NOMA networks with SWIPT-enabled relays
Abstract

This paper considers network sum-rate maximization for network-coded clustered uplink non-orthogonal multiple-access (NOMA) networks with simultaneous wireless information and power transfer (SWIPT)-enabled relays. Specifically, the aim is to ...

research-article
Hybrid cell handover strategy for O-RAN-based campus networks
Abstract

In recent years, the concept of Open Radio Access Network (O-RAN) has become a prominent and ongoing research area in mobile communications, as mobile operators strive to enhance the intelligence, efficiency, and vendor independence of their RAN (...

research-article
FedSBS: Federated-Learning participant-selection method for Intrusion Detection Systems
Abstract

Federated Learning (FL) is a decentralized machine learning approach in which multiple participants collaboratively train a model. Participants keep data locally, train their local models, and aggregate them in a single global model in a ...

research-article
Deep reinforcement learning enhanced skeleton based pipe routing for high-throughput transmission in flying ad-hoc networks
Abstract

Artificial Intelligence (AI) is a huge step towards the emergence of powerful and smart decision-makers which can optimally tune the network parameters. In this work, a novel idea of an intelligent pipe (iPipe) routing scheme for a network of ...

research-article
Energy efficient multipath routing in space division multiplexed elastic optical networks
Abstract

This paper introduces a novel dynamic multipath routing, modulation level, spatial and spectrum assignment algorithm for space division multiplexing (SDM) enabled elastic optical networks (EON) with the aim of minimizing the blocking probability ...

research-article
Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT
Abstract

In recent years, Maritime Transportation Systems (MTS) have experienced significant advancements through the adoption of Internet of Things (IoT) technology. The introduction of 6G mobile networks has further expanded possibilities by offering ...

research-article
Online two-timescale service placement for time-sensitive applications in MEC-assisted network: A TMAGRL approach
Abstract

Mobile edge computing (MEC) integrated with the Network Functions Virtualization (NFV) technique has been regarded as a promising solution for flexible services provision and user service experience improvement. However, existing service ...

Survey Articles
article
Blockchain solutions for trustworthy decentralization in social networks
Abstract

The influence of blockchain on technology, especially in the field of finance, has brought about the age of cryptocurrencies and decentralized control, spreading its impact across various industries to ensure precision. As the trend moves towards ...

Highlights

  • Blockchain’s impact on trust and privacy in digital societies.
  • Decentralized networks as privacy-enhancing alternatives.
  • Decentralized social networks, countering centralization risks.
  • Analyzing trust models in decentralized ...

article
A comprehensive survey on digital twin for future networks and emerging Internet of Things industry
Abstract

The rapid growth of industrial digitalization in the Industry 4.0 era is fundamentally transforming the industrial sector by connecting products, machines, and people, offering real-time digital models to allow self-diagnosis, self-optimization ...

Highlights

  • We present a literature survey on Digital Twin for future IoT networks.
  • We describe 5G digital twins research projects and tooling and use cases.
  • We discuss standardization efforts in the realm of digital twins.
  • we delve into ...

Data Article
article
WebRTC-QoE: A dataset of QoE assessment of subjective scores, network impairments, and facial & speech features
Abstract

In the realm of real-time communications, WebRTC-based multimedia applications are increasingly prevalent as these can be smoothly integrated within Web browsing sessions. The browsing experience is then significantly improved with respect to ...

Special Issue on Network Softwarization and Intelligence at the Edge: Challenges and Opportunities
research-article
DESiRED — Dynamic, Enhanced, and Smart iRED: A P4-AQM with Deep Reinforcement Learning and In-band Network Telemetry
Abstract

Active Queue Management (AQM) is a mechanism employed to alleviate transient congestion in network device buffers, such as routers and switches. Traditional AQM algorithms use fixed thresholds, like target delay or queue occupancy, to compute ...

Graphical abstract

Display Omitted

Highlights

  • AQM is employed to alleviate transient congestion in network devices.
  • Traditional AQM algorithms use fixed thresholds, like target delay or queue occupancy, to compute random packet drop probabilities.
  • Due to dynamic network ...

research-article
A measurement-based approach to analyze the power consumption of the softwarized 5G core
Abstract

In light of the ever growing energy needs of the ICT sector, a value that is becoming increasingly important for a mobile network is its power consumption. However, the transition away from legacy network deployments tightly coupled with the ...

research-article
Experimental assessment of a JANUS-based consensus protocol
Abstract

This paper proposes a distributed, JANUS-based protocol that enables an underwater acoustic network to reach consensus on arbitrary local opinions as numeric state variables. An envisioned scenario where nodes shall agree on parameters describing ...

research-article
Multisite gaming streaming optimization over virtualized 5G environment using Deep Reinforcement Learning techniques
Abstract

The massive growth of live streaming, especially gaming-focused content, has led to an overall increase in global bandwidth consumption. Certain services see their quality diminished at times of peak consumption, degrading the quality of the ...

research-article
A multipath scheduler based on cross-layer information for low-delay applications in 5G edge networks
Abstract

Virtual Reality (VR) applications that require extremely low delay and high image quality are widely used in online games and other 5G scenarios, becoming a hot research field in recent years. However, the limited bandwidth in 5G edge networks ...

research-article
SYNTROPY: TCP SYN DDoS attack detection for Software Defined Network based on Rényi entropy
Abstract

The rapidly evolving landscape of network security, particularly in Software Defined Networks (SDNs), presents a critical need for efficient and adaptive DDoS attack detection methods, especially in the face of TCP SYN DDoS attacks. These attacks ...

Special Issue on High Performance Switching and Routing
research-article
Instant queue occupancy used for automatic traffic scheduling in data center networks
Abstract

Datacenter applications desire low latency for short messages to provide a better user experience. Therefore, one of the goals of datacenter networks is to minimize flow completion time (FCT), especially for short flows. Multiple scheduling ...

Special Issue on New Trends and Issues in Future Generations of 5G/6G Vehicular Networks
review-article
DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA
Abstract

Today’s advancement in Vehicular Ad-hoc Networks (VANET) constitutes a cornerstone in ensuring traffic safety in Intelligent Transportation Systems (ITS). In this context, vehicle-to-vehicle (V2V) communications are a pivotal enabler for road ...

Highlights

  • We propose a DID-based reputation scheme for VANET compliant with ETSI standards.
  • We provide the research community with the first ETSI-compliant V2V dataset.
  • We implement and evaluate DIVA in 5G-enabled scenarios proving its ...

Comments