An overview of MAC energy-saving mechanisms in Wi-Fi
The IEEE 802.11 standard has rapidly become the de facto standard for Wireless Local Area Networks (WLANs) under the commercial name Wi-Fi. Despite IEEE’s regular efforts to improve the energy efficiency of Wi-Fi, many energy-saving mechanisms ...
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions
In recent years, Decentralized Online Social Networks (DOSNs) have been attracting the attention of many users because they reduce the risk of censorship, surveillance, and information leakage from the service provider. In contrast to the most ...
Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices
The remarkable advance of the Internet of Things (IoT) has smoothed the way to the interconnection of various mobile devices in secure access and communication. In order to guarantee user privacy and anonymity in public networks, a large number ...
Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs
Reliable connectivity restoration mechanism is essential for retaining the prolonged network functioning of Wireless Sensor and Actor Networks (WSANs). WSANs operate in harsh or inhospitable environments and are susceptible to multiple node ...
Multi-user edge service orchestration based on Deep Reinforcement Learning
The fifth generation (5G) of mobile network offers a remarkable degree of flexibility to mobile operators, enabling them to provide users with effective and tailored network services. Software Defined Networking (SDN), Network Function ...
Enabling privacy by anonymization in the collection of similar data in multi-domain IoT
The efficiency of Internet of Things (IoT) systems heavily relies on possessing trustworthy and up-to-date data. Thus, data collection represents a key feature in IoT applications and services that rely on data-streams. Reusing the same data-...
Multi-UAV WRSN charging path planning based on improved heed and IA-DRL
Aiming at the problem of how to improve the energy utilization rate of UAV (Unmanned Aerial Vehicle) in the charging process of wireless rechargeable sensor network, a charging path planning scheme for multi-UAV wireless rechargeable sensor ...
TCAM-based packet classification for many-field rules of SDNs
Software-defined networking (SDN) provides an emerging paradigm for future network architectures. OpenFlow is a widely deployed south-bound protocol for SDN. It uses rule-based packet forwarding and each rule may support many header fields for ...
Fine-grained frequencies meet synchronous transmission
Fine-grained frequencies have been used for IEEE 802.15.4 based communication in several recent works to enhance network throughput as well as combat Cross Technology Interference (CTI) in licence free ISM bands. However, the works demonstrate ...
Joint think locally and globally: Communication-efficient federated learning with feature-aligned filter selection
Federated learning, as a distributed machine learning framework that can protect data privacy, has recently received increasing attention. In federated learning, a shared global model is obtained through parameter interaction, which leads to ...
Locality-aware deployment of application microservices for multi-domain fog computing
In fog computing customers’ microservices may demand access to connected objects, data sources and computing resources outside the domain of their fog provider In practice, the locality of connected objects renders mandatory a multi-domain ...
A cost-efficient hybrid redundancy coding scheme for wireless storage systems
With distributed storage technique becoming a promising technology for storing massive data in wireless environment, how to improve the reliability of the storage systems has become the focus of researchers. As a redundancy scheme, the erasure ...
A parallel computing based model for online binary computation offloading in mobile edge computing
Mobile-edge computing (MEC) with wireless power transfer has recently emerged as a viable concept for improving the data processing capacity of limited powered networks like wireless sensor networks (WSN) and the internet of things (IoT). In this ...
AI-assisted traffic matrix prediction using GA-enabled deep ensemble learning for hybrid SDN
A hybrid software-defined network (SDN), which is a network where traditional routers and SDN protocols coexist during the incremental deployment of SDNs, requires real-time link traffic information for effective deployment. This has called for ...
Joint resource optimization and trajectory design for energy minimization in UAV-assisted mobile-edge computing systems
This paper studies an unmanned aerial vehicle (UAV)-assisted mobile-edge computing (MEC) system, where a rotary-wing UAV equipped with computing platforms is used to assist ground users (GUs) with insufficient computing resource. Each GU offloads ...
Complex parts machining path planning through cross-source point cloud processing
When cleaning cast parts, production machinery such as robots and smart machines must be able to operate tools along appropriate machining paths. Planning the machining path using 3D point cloud processing techniques is a suitable approach. The ...
Highlights
- To plan the robotic machining path of complex parts, a novel cross-source point cloud processing based method is proposed. The core of this method is the accurate registration of cross-source point clouds with relatively large scale ...
Robust decentralized stochastic gradient descent over unstable networks
Decentralized learning is essential for large-scale deep learning due to its great advantage in breaking the communication bottleneck. Most decentralized learning algorithms focus on reducing the communication overhead without taking into account ...
Interpretable intrusion detection for next generation of Internet of Things
This paper presents a new framework for intrusion detection in the next-generation Internet of Things. MinMax normalization strategy is used to collect and preprocess data. The Marine Predator algorithm is then used to select relevant features to ...
IoT-assisted feature learning for surface settlement prediction caused by shield tunnelling
The surface settlement caused by shield tunnelling may lead to collapse disaster, threatening the safety of ground and underground structures. Therefore, the prediction of surface settlement has attracted much attention, but the problem has not ...
Highlights
- The time–space relationship of surface settlement caused by shield tunnelling cannot be ignored.
- A IoT-assisted feature learning algorithm for predicting surface settlement is proposed.
- The prediction effect of the proposed ...
A temporal–spatial analysis on the socioeconomic development of rural villages in Thailand and Vietnam based on satellite image data
Obtaining accurate and timely estimates of socio-economic status at fine geographical resolutions is essential for global sustainable development and the fight against poverty. However, data related to local socio-economic dynamics in rural ...
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish–subscribe model, and edge computing
Attribute-based Searchable Encryption is emerging as a promising cryptographic technique supporting data protection, flexible access control, and keyword search over encrypted data. The current scientific literature already investigated its ...
Modeling Value of Information in remote sensing from correlated sources
This paper investigates data correlation in remote sensing networks and how it can be characterized through diverse models quantifying the Value of Information (VoI), a metric that describes how informative the data transmitted by the sensors ...
Highlights
- In scenarios with multiple sources, their correlation benefits the Age of Information.
- When correlation is considered, we better speak of Value of Information (VoI).
- To track it, we exploit the Markov property of the resulting ...
Reinforced practical Byzantine fault tolerance consensus protocol for cyber physical systems
Cyber–physical systems (CPS) are becoming an essential component of modern life. CPS services enable information to be exchanged between physical devices and virtual systems. The increasing malicious activities causing confidential data leakage ...
Graphical abstractDisplay Omitted