Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 218, Issue CMar 2024
Reflects downloads up to 16 Oct 2024Bibliometrics
Skip Table Of Content Section
editorial
Regular Articles
research-article
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Abstract

In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. ...

research-article
A comprehensive latency profiling study of the Tofino P4 programmable ASIC-based hardware
Abstract

Network softwarization has significantly evolved since programmable data planes became topical in academia and industry. Programming Protocol-Independent Packet Processors (P4) is a language to define packet forwarding behavior. Forwarding ...

research-article
PUF-based dynamic secret-key strategy with hierarchical blockchain for UAV swarm authentication
Abstract

The evolving UAV swarm flight environment exacerbates the difficulty of secure message delivery within the swarm. Physical Unclonable Functions (PUFs) have the potential to provide lightweight physical identities to UAV nodes. Nevertheless, the ...

research-article
AlLoRa: Empowering environmental intelligence through an advanced LoRa-based IoT solution
Abstract

Environmental intelligence aims to improve the decision-making process for high social and environmental value ecosystems. To this end, data are collected using different sensors to allow monitoring of different variables of interest. Typically, ...

research-article
Blockchain-based remote operation and maintenance network slicing resource transaction method for intelligent manufacturing products
Abstract

With the development of the Industrial Internet of Things (IIoT), there will be more and more intelligent manufacturing products requiring remote monitoring, maintenance, management, and optimization. IIoT and intelligent manufacturing require ...

research-article
Coverage performance of cooperative NOMA MmWave networks with wireless power transfer
Abstract

The millimeter-wave (mmWave) plays a vital role in the fifth generation (5G) and beyond-5G (B5G) cellular networks, which is also attractive for wireless power transfer (WPT) since the mmWave base stations (BSs) are usually equipped with large ...

research-article
Untargeted white-box adversarial attack with heuristic defence methods in real-time deep learning based network intrusion detection system
Abstract

Network Intrusion Detection System (NIDS) is a key component in securing the computer network from various cyber security threats and network attacks. However, consider an unfortunate situation where the NIDS is itself attacked and vulnerable; ...

research-article
Evaluation of Greedy and CBF for ETSI non-area GeoNetworking: The impact of DCC
Abstract

This paper evaluates the performance of the two ETSI non-area forwarding algorithms in the GeoNetworking specification: Greedy Forwarding and Non-Area Contention-Based Forwarding (CBF). Non-area forwarding occurs when a packet is sent to a ...

Highlights

  • Greedy Forwarding does not work when used with a congestion control mechanism.
  • This leaves CBF as the only viable ETSI ITS non-area forwarding mechanism.
  • CBF, as defined in ETSI ITS GeoNetworking, is effective but not efficient.

research-article
An attack-resistant target localization in underwater based on consensus fusion
Abstract

Target localization has been regarded as one of the most important techniques of underwater sensor networks (USNs). However, the challenges posed by weak communication, inhomogeneous medium, and openness of underwater environment make ...

research-article
EAPRAD: A MAC protocol for Enhancing Access Probability and Reducing Access Delay in VANETs
Abstract

Vehicular Ad Hoc Networks (VANETs) present challenges in terms of access collision and merge collision, leading to increased access delay in end-to-end vehicle communication. How to address these issues remains an unsolved problem. In this paper, ...

research-article
A distinguished-bit tracking knowledge-based query tree for RFID tag identification
Abstract

—Many RFID systems own the information of RFID tags in the database, so the reader knows how many tags will be identified and which tags’ IDs might appear. How the RFID anti-collision protocols take advantage of this knowledge is a challenge. ...

research-article
A physical layer security scheme for 6G wireless networks using post-quantum cryptography
Abstract

The sixth generation (6G) of mobile networks is poised to revolutionize communication capabilities with its infinite-like reach. These networks will feature an ultra-dense topology, accommodating a wide range of devices, from macro devices like ...

research-article
Privacy-preserving and verifiable data aggregation for Internet of Vehicles
Abstract

With the development of Internet of Vehicles (IoV), organizations or institutions are increasingly interested in aggregating vehicle perception data to perform data analysis. Nevertheless, the existing solutions are difficult to meet the ...

research-article
GEMLIDS-MIOT: A Green Effective Machine Learning Intrusion Detection System based on Federated Learning for Medical IoT network security hardening
Abstract

The increasing use of Internet of Things (IoT) gadgets in a daily rate has heightened security apprehension, particularly within the healthcare sector. In order to prevent the unauthorized disclosure of sensitive data, it is imperative for ...

research-article
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication
Abstract

Data sharing has received much attention and research as an excellent way to unlock the value of data. Trusted data storage servers will participate in the data-sharing system to provide users with convenient data access and storage services. ...

research-article
Online Learning to parallel offloading in heterogeneous wireless networks
Abstract

In the forthcoming era of 6G, the deployment of dense and diverse wireless networks equipped with edge servers makes parallel offloading a crucial technology for multiple access edge computing. However, the effectiveness of parallel offloading is ...

research-article
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0
Abstract

Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven decision-making through machine-to-machine (M2M) communication, often facilitated by the 6LoWPAN standard. However, as a resource-constrained ...

research-article
An optimization NPUSCH uplink scheduling approach for NB-IoT application via the feasible combinations of link adaptation, Resource assignment and energy efficiency
Abstract

Low-power wide area (LPWA) technology, specifically Narrowband Internet of Things (NB-IoT), has emerged as a pivotal sixth-generation (6G) network technology, catering to the demands of massive-type communications (m-MTC), extended battery life, ...

Special issue on Digital Twins for the Computer-Networks Evolution
research-article
Cyber–physical system architecture of autonomous robot ecosystem for industrial asset monitoring
Abstract

Driven by advancements in Industry 4.0, the Internet of Things (IoT), digital twins (DT), and cyber–physical systems (CPS), there is a growing interest in the digitalizing of asset integrity management. CPS, in particular, is a pivotal technology ...

Special Issue on Selected and extended papers from the 18th Wireless On-demand Network systems and Services Conference
research-article
Radio-in-the-Loop simulation and emulation modeling for energy-efficient and cognitive Internet of Things in smart cities: A cross-layer optimization case study
Abstract

Wireless communication technologies and Internet of Things (IoT) applications are the main drivers of upcoming sustainable smart networks which require an effective resource management. The reduction of the transmission energy consumption and the ...

Special Issue on Security and Reliability in Future Intelligent Mobile Communication
research-article
A secure certificateless ring signcryption scheme based on SM2 algorithm in smart grid
Abstract

In the context of smart grids, bidirectional transmission of electricity information enables real-time electricity generation tailored to consumer needs. However, ensuring user privacy during data collection has emerged as a significant concern ...

Comments