Computer Networks最新文献

筛选
英文 中文
LDD-Track: An energy-efficient deep reinforcement learning framework for multi-subject tracking in mobile crowdsensing LDD-Track:一种高效的深度强化学习框架,用于移动众测中的多主题跟踪
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-28 DOI: 10.1016/j.comnet.2025.111735
Erfan Parhizi, Rasool Esmaeilyfard, Reza Javidan
{"title":"LDD-Track: An energy-efficient deep reinforcement learning framework for multi-subject tracking in mobile crowdsensing","authors":"Erfan Parhizi,&nbsp;Rasool Esmaeilyfard,&nbsp;Reza Javidan","doi":"10.1016/j.comnet.2025.111735","DOIUrl":"10.1016/j.comnet.2025.111735","url":null,"abstract":"<div><div>Multi-subject tracking in Mobile Crowdsensing Systems (MCS) is a challenging task due to dynamic mobility, limited energy resources, and the need for real-time decisions. Traditional models like Kalman Filters and Hidden Markov Models struggle in such conditions, while Transformer-based deep learning methods offer high accuracy but are too computationally demanding for mobile use. Unlike previous studies that focus on one-to-one or collaborative group tracking, which often lack scalability and adaptability to real-world complexities, we propose LDD-Track, a novel multi-subject tracking framework that integrates Long Short-Term Memory (LSTM) networks with an adaptive attention mechanism, Density-Based Spatial Clustering of Applications with Noise (DBSCAN), and Deep Q-Network (DQN)-based user allocation. The LSTM model, enhanced with attention mechanisms, dynamically assigns weights <span><math><msub><mi>α</mi><mi>t</mi></msub></math></span> to past trajectory points, filtering noise and improving prediction accuracy. The DBSCAN clustering technique effectively groups subjects based on predicted movement, optimizing resource allocation and reducing computational overhead. The DQN-based user assignment strategy models resource optimization as a Markov Decision Process (MDP), leveraging the Q-value function <span><math><mrow><mi>Q</mi><mo>(</mo><msub><mi>s</mi><mi>t</mi></msub><mo>,</mo><msub><mi>a</mi><mi>t</mi></msub><mo>)</mo></mrow></math></span> to ensure adaptive and energy-efficient user allocation. Extensive experiments on the Taxi Mobility in Rome dataset demonstrate the superiority of LDD-Track. The framework achieves a 51 % reduction in energy consumption, a 39 % increase in Coverage Completion Rate (CCR), and a 9.7 % improvement in resource allocation efficiency compared to state-of-the-art methods. These findings validate the effectiveness of integrating attention-based prediction and deep reinforcement learning in large-scale, real-time MCS environments.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111735"},"PeriodicalIF":4.6,"publicationDate":"2025-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF-AbVib: Environment-independent vibration monitoring using COTS RFID devices RF-AbVib:使用COTS RFID设备进行环境无关振动监测
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-27 DOI: 10.1016/j.comnet.2025.111738
Min Li , Guangxuan Bai , Di Gao , Shuai Wang , Siye Wang , Yanfang Zhang , Yue Feng
{"title":"RF-AbVib: Environment-independent vibration monitoring using COTS RFID devices","authors":"Min Li ,&nbsp;Guangxuan Bai ,&nbsp;Di Gao ,&nbsp;Shuai Wang ,&nbsp;Siye Wang ,&nbsp;Yanfang Zhang ,&nbsp;Yue Feng","doi":"10.1016/j.comnet.2025.111738","DOIUrl":"10.1016/j.comnet.2025.111738","url":null,"abstract":"<div><div>Endowing IoT devices with self-security monitoring capabilities without relying on external hardware marks a significant advancement in the field. RFID-equipped smart cabinets, while providing robust protection for sensitive items such as documents and electronic devices, remain vulnerable to violent break-ins or physical disturbances such as slapping and shaking, which produce characteristic vibration patterns. We demonstrated that the cabinet’s integral RFID system can inherently detect such vibrations, thus enhancing its self-security. However, overcoming environmental dependency remains a critical challenge: variations in the shape, size, material, and spatial arrangement of items inside the cabinet interfere with RFID signal propagation, resulting in complex multipath effects that compromise vibration-sensing accuracy and weaken security detection. To address this limitation and enable self-security monitoring, we proposed RF-AbVib, a novel solution that utilizes commercial off-the-shelf RFID readers in conjunction with a fixed reference tag mounted on the inner wall of the cabinet to achieve environment-independent vibration monitoring. We pre-trained and fine-tuned a meta-learning model to enable RF-AbVib to process variable-length data and adapt to diverse environmental conditions. Furthermore, we proposed a bilateral threshold filtering (BTF) algorithm combined with discrete wavelet transform (DWT) to remove outliers and hardware noise while preserving subtle vibration features in RFID signals. Evaluated across 31 distinct environments, RF-AbVib achieved 95.59 % accuracy in detecting three abnormal behaviors with only one sample, regardless of the reference tag’s position, orientation, or type. Relevant data has been uploaded to the <span><span>RF-AbVib dataset</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111738"},"PeriodicalIF":4.6,"publicationDate":"2025-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense against backdoor attacks in federated learning with robust adaptive learning rates 利用鲁棒自适应学习率防御联邦学习中的后门攻击
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-26 DOI: 10.1016/j.comnet.2025.111720
Hongtao Li , Yongjun Fang , Jie Wang , Xianglin Li , Bo Wang
{"title":"Defense against backdoor attacks in federated learning with robust adaptive learning rates","authors":"Hongtao Li ,&nbsp;Yongjun Fang ,&nbsp;Jie Wang ,&nbsp;Xianglin Li ,&nbsp;Bo Wang","doi":"10.1016/j.comnet.2025.111720","DOIUrl":"10.1016/j.comnet.2025.111720","url":null,"abstract":"<div><div>Federated Learning (FL) serves as a privacy-preserving paradigm that not only protects user privacy, but also improves model generalization ability and data security. However, by launching a backdoor attack, a vicious client can embed the backdoor in a the global model to deviate the direction of the model update, leading to the desired misclassification. To defend against backdoor attacks, we proposes a Robust Adaptive Learning Rate method (RALR). RALR takes into account the way of voting the gradient symbols of the clients by dimension, which means that no single client will have too much power. In addition, RALR adaptively finds the learning threshold so that the symbol voting value of each dimension reaches a certain number before it can participate in the global aggregation, and the bad influence of backdoor attackers on the global model training will be weakened as a result. In addition, the introduction of the sign gradient mechanism effectively protects the privacy of the update parameters. RALR not only ensures the performance of the main task under different experimental conditions, but also effectively eliminates the backdoor. The experimental results show that the robust adaptive learning rate method can defend against the backdoor attack very effectively. The successful rate of the attack is reduced to 1.9 % compared to the existing defense.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111720"},"PeriodicalIF":4.6,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial attack and defence of federated learning-based network traffic classification in edge computing environment 边缘计算环境下基于联邦学习的网络流量分类对抗性攻击与防御
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-25 DOI: 10.1016/j.comnet.2025.111739
Azizi Ariffin , Faiz Zaki , Hazim Hanif , Nor Badrul Anuar
{"title":"Adversarial attack and defence of federated learning-based network traffic classification in edge computing environment","authors":"Azizi Ariffin ,&nbsp;Faiz Zaki ,&nbsp;Hazim Hanif ,&nbsp;Nor Badrul Anuar","doi":"10.1016/j.comnet.2025.111739","DOIUrl":"10.1016/j.comnet.2025.111739","url":null,"abstract":"<div><div>Network Traffic Classification (NTC) is vital for network management and security. However, as internet traffic volume increases, centralised model training causes scalability and privacy issues for NTC. To address these issues, distributing NTC model training to multiple edge clients via Federated Learning (FL) provides a solution by reducing latency, improving system scalability, and preserving data privacy. Nonetheless, the distributed nature of FL makes it vulnerable to various adversarial attacks from multiple clients, consequently degrading the model's performance. Most studies focus on a limited range of attacks, often overlooking more advanced and subtle threats, such as backdoor attacks and those based on Generative Adversarial Networks (GANs). Despite the growing attack complexity, existing defensive measures in the NTC domain struggle to mitigate multiple adversarial attack types simultaneously. To validate this claim, this study investigates the vulnerabilities of FL-based NTC training against four types of adversarial attacks: label flipping (LF) and model poisoning, and introduces customized backdoor and GAN-based attack scenarios tailored specifically to FL-based NTC training. When evaluated using the ISCX-VPN 2016 dataset, the results demonstrate that FL-based NTC is vulnerable to all four types of adversarial attacks. For instance, the LF attack reduced accuracy by 98.66 % in a collusive scenario, while the backdoor attack achieved a 40 % success rate. In comparison, the GAN attack lowered the F1 score of the target class by 18 %. Therefore, to strengthen the defense against adversarial attacks, this study proposes a robust conceptual defense framework capable of defending against multiple adversarial attack types simultaneously. The framework incorporates remote attestation scoring, hierarchical training, and an adaptive aggregation mechanism and conducts logic analysis to evaluate its effectiveness. The analysis demonstrates that it successfully maintains the model with 76 % accuracy under multiple adversarial attacks during training compared to an 80 % reduction without defensive measures.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111739"},"PeriodicalIF":4.6,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A provably efficient in-network computing services deployment approach for security burst 一种有效的安全突发网络计算服务部署方法
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-25 DOI: 10.1016/j.comnet.2025.111737
Danyang Zheng , Chao Wang , Honghui Xu , Wenyi Tang , Yihan Zhong , Xiaojun Cao
{"title":"A provably efficient in-network computing services deployment approach for security burst","authors":"Danyang Zheng ,&nbsp;Chao Wang ,&nbsp;Honghui Xu ,&nbsp;Wenyi Tang ,&nbsp;Yihan Zhong ,&nbsp;Xiaojun Cao","doi":"10.1016/j.comnet.2025.111737","DOIUrl":"10.1016/j.comnet.2025.111737","url":null,"abstract":"<div><div>The emerging in-network computing (INC) technique delegates computations to the network data plane, enabling clients' data to be processed during transmission. However, processing transmitted data within INC-enabled network devices may lead to security concerns and broaden the attack surface as sensitive data can be exposed during computation, making the network more susceptible to various cyber-attacks. To protect against such cyber-attacks, especially in security-sensitive applications such as finance and healthcare, clients might periodically enhance service security requirements regarding the importance of their to-be-transmitted data. This periodic security enhancement is called a “security burst” (SEB). To meet such enhancement, one may implement security-aware network functions (S-NFs) like firewall and deep packet inspection on smart routers or switches along the forwarding path while maximizing the re-utilization of this path. Despite the growing interest in INC and security service deployment, existing solutions typically assume static security requirements and overlook the dynamic, on-demand security enhancements such as SEBs. Furthermore, prior approaches rarely consider the re-utilization of existing in-path services, leading to higher additional costs. To fill this gap, this work shows pioneering efforts in tackling SEB for INC-enabled services. Assuming that re-employing the resources along the original forwarding path does not incur bandwidth cost, we formally establish a novel problem called INC-enabled Service Migration for SEB (ISME) to optimize additional cost and prove its NP-hardness. To solve this problem, we design an efficient cost-security-burst (CSB) measure and develop an innovative CSB measure-based security enhancement (CSB-SE) algorithm, which is mathematically proved to be logarithm approximate. Extensive simulations show that CSB-SE guarantees logarithm-approximate performance and outperforms the benchmark by an average of 37.11 % regarding the total service cost and 102.38 % in terms of the additional cost.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111737"},"PeriodicalIF":4.6,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSAFL:Decentralized secure aggregation with communication path optimization for cross-silo federated learning DSAFL:用于跨竖井联邦学习的具有通信路径优化的分散安全聚合
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-25 DOI: 10.1016/j.comnet.2025.111732
Ling Li , Cheng Guo , Xinyu Tang , Yining Liu
{"title":"DSAFL:Decentralized secure aggregation with communication path optimization for cross-silo federated learning","authors":"Ling Li ,&nbsp;Cheng Guo ,&nbsp;Xinyu Tang ,&nbsp;Yining Liu","doi":"10.1016/j.comnet.2025.111732","DOIUrl":"10.1016/j.comnet.2025.111732","url":null,"abstract":"<div><div>Cross-Silo Federated Learning (CSFL) facilitates collaborative machine learning (ML) across organizations by locally training models and centrally aggregating model updates. Currently, this approach is shifting to decentralized aggregation due to the limitations of centralized aggregation such as single-point failures and network congestion. However, existing decentralized aggregation methods often suffer from privacy leakage and high communication cost. To address these issues, we propose DSAFL, a decentralized secure aggregation scheme for CSFL. In DSAFL, we present a staged secure aggregation method based on multi-key homomorphic encryption, which enables load-balanced collaborative aggregation computation across clients while preserving model update confidentiality and providing verifiability of the aggregation result. DSAFL optimizes communication paths by jointly considering communication cost and reliability, enabling cost-efficient and robust secure aggregation across diverse network topologies, and further reduces communication cost through non-interactive decryption. The security analysis proves that DSAFL is semi-honestly secure and resistant to client collusion attacks. The experimental results confirm the practicality and applicability of DSAFL, and show significant advantages in both accuracy and privacy. With a combination of computational balancing, low communication cost, and privacy preservation, DSAFL provides a solution for enabling sustainable ML collaboration across organizations.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111732"},"PeriodicalIF":4.6,"publicationDate":"2025-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FuzzyDoo: A framework for finding flaws in the 5G landscape FuzzyDoo:一个发现5G环境缺陷的框架
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-24 DOI: 10.1016/j.comnet.2025.111734
Rosario G. Garroppo, Michele Pagano, Gabriele Pongelli
{"title":"FuzzyDoo: A framework for finding flaws in the 5G landscape","authors":"Rosario G. Garroppo,&nbsp;Michele Pagano,&nbsp;Gabriele Pongelli","doi":"10.1016/j.comnet.2025.111734","DOIUrl":"10.1016/j.comnet.2025.111734","url":null,"abstract":"<div><div>The increasing complexity and criticality of 5G networks demand rigorous security testing methodologies, particularly in black-box environments where source code access is restricted. This paper introduces FuzzyDoo, an open-source, mutation-based structure-aware fuzzing framework designed to assess the robustness and security of 5G Core (5GC) network functions under black-box conditions. FuzzyDoo advances the state of the art by enabling dynamic test message generation for encrypted communications, supporting extensible protocol integration, and facilitating flexible deployment of monitoring components in multi-system environments. The paper details the framework modular architecture – to the best of our knowledge, the first of its kind in the open-source domain – and demonstrates its efficacy through experimental evaluations on three open-source 5GC frameworks. These experiments reveal implementation-specific vulnerabilities and underscore FuzzyDoo diagnostic capabilities for root cause analysis.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111734"},"PeriodicalIF":4.6,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards trustworthy digital twins collaboration in the internet of things: An overview of essential design guidelines 在物联网中实现可信赖的数字孪生合作:基本设计准则概述
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-24 DOI: 10.1016/j.comnet.2025.111733
Claudio Marche , Michele Nitti
{"title":"Towards trustworthy digital twins collaboration in the internet of things: An overview of essential design guidelines","authors":"Claudio Marche ,&nbsp;Michele Nitti","doi":"10.1016/j.comnet.2025.111733","DOIUrl":"10.1016/j.comnet.2025.111733","url":null,"abstract":"<div><div>The growth of the Internet of Things (IoT), characterized by billions of interconnected devices represented by Digital Twins (DTs), poses significant challenges in ensuring reliable communication. While Service Level Agreements (SLAs) and Key Performance Indicators (KPIs) offer a foundation for performance monitoring, they are insufficient in decentralized scenarios where devices frequently interact without knowing each other. In this context, Trust Management Systems (TMSs) emerge as a possible solution to support cooperation, evaluating the reliability of both data and DTs. In this context, this paper addresses the problem of trust in the IoT by modeling interactions among DTs through a game-theory approach, where each DT is seen as a game-rational player. Based on this model, we derive a set of design guidelines for the development of TMSs that consider both errors and malicious behaviours. Furthermore, we apply these guidelines to assess and compare several recognized TMSs from the literature, highlighting their strengths and limitations.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111733"},"PeriodicalIF":4.6,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic generation of industrial internet attack graphs with graph neural networks and Bayesian models 基于图神经网络和贝叶斯模型的工业互联网攻击图自动生成
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-23 DOI: 10.1016/j.comnet.2025.111736
Luyao Zhang , Gaigai Tang , Xin He , Kaiyuan Qi , Guangfeng Su , Huiyun Zhang
{"title":"Automatic generation of industrial internet attack graphs with graph neural networks and Bayesian models","authors":"Luyao Zhang ,&nbsp;Gaigai Tang ,&nbsp;Xin He ,&nbsp;Kaiyuan Qi ,&nbsp;Guangfeng Su ,&nbsp;Huiyun Zhang","doi":"10.1016/j.comnet.2025.111736","DOIUrl":"10.1016/j.comnet.2025.111736","url":null,"abstract":"<div><div>Industrial Internet is increasingly exposed to highly complex, heterogeneous, and multi-stage security threats, posing long-term potential risks to system security. Efficient and intelligent attack graph generation techniques are essential for accurately modeling potential attack paths and enabling visual analysis, thereby supporting proactive defense and attack attribution. However, existing methods primarily rely on static rules or expert knowledge, making them inadequate in capturing the dynamic nature, uncertainty, and complex dependencies of attack paths, and thus ineffective against emerging and sophisticated attack scenarios. To address these challenges, this paper proposes a novel automatic attack graph generation method for the Industrial Internet, termed IndustGNN-AG, which integrates Graph Neural Networks (GNNs) with Bayesian inference. The proposed method leverages the deep feature learning capability of GNNs to automatically extract network behavior features and employs Bayesian techniques to model the uncertainty of attack paths. A multi-layer graph attention mechanism is introduced to capture inter-node dependencies, and a probabilistic path estimation framework is developed by combining node-level and edge-level uncertainties, enabling a more comprehensive analysis of potential attack paths. Experimental results on three representative Industrial Internet attack datasets, namely Mirai_Botnet, SSDP Flood, and SYN DoS, demonstrate that IndustGNN-AG achieves accuracy rates of 99.40%, 100%, and 96.33%, respectively, in attack graph generation tasks. Compared with existing approaches, IndustGNN-AG exhibits significant improvements on accuracy and scalability.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111736"},"PeriodicalIF":4.6,"publicationDate":"2025-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145220810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entangled qubit pricing for quantum networks 量子网络的纠缠量子比特定价
IF 4.6 2区 计算机科学
Computer Networks Pub Date : 2025-09-22 DOI: 10.1016/j.comnet.2025.111728
Xiaoyu Wang , Yu Jia , Yangming Zhao , Shouxi Luo , Haoze Chen , Chen Tian , Dong Zhang , Bingheng Yan
{"title":"Entangled qubit pricing for quantum networks","authors":"Xiaoyu Wang ,&nbsp;Yu Jia ,&nbsp;Yangming Zhao ,&nbsp;Shouxi Luo ,&nbsp;Haoze Chen ,&nbsp;Chen Tian ,&nbsp;Dong Zhang ,&nbsp;Bingheng Yan","doi":"10.1016/j.comnet.2025.111728","DOIUrl":"10.1016/j.comnet.2025.111728","url":null,"abstract":"<div><div>In this paper, we propose an approach named Entangled quBit Pricing (EBP) to price the entangled quantum bits (called ebits) in Resources as a Service (RaaS) quantum networks. In such a quantum network, the service provider pursues the maximum payoff by setting the price of ebits over each link, based on which users decide the number of ebits to purchase such that they can obtain the maximum payoff from establishing entanglement connections (ECs). The unique feature of the routing related pricing issue in quantum networks is that a user may purchase a different number of ebits over each link along his entanglement path in order to establish one EC. By taking into consideration the interaction between the service provider and users, EBP can derive a pricing scheme such that each user will automatically choose the entanglement path and purchase ebits following the way to maximize the service provider’s payoff. Extensive simulations show that the service provider can obtain 97 % more payoff with EBP compared with simply setting higher prices to ebits that can successfully create entanglements with higher probability.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"272 ","pages":"Article 111728"},"PeriodicalIF":4.6,"publicationDate":"2025-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145158527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信