Computer NetworksPub Date : 2024-09-14DOI: 10.1016/j.comnet.2024.110790
Ruiyang Ding , Lei Sun , Weifei Zang , Leyu Dai , Zhiyi Ding , Bayi Xu
{"title":"Towards universal and transferable adversarial attacks against network traffic classification","authors":"Ruiyang Ding , Lei Sun , Weifei Zang , Leyu Dai , Zhiyi Ding , Bayi Xu","doi":"10.1016/j.comnet.2024.110790","DOIUrl":"10.1016/j.comnet.2024.110790","url":null,"abstract":"<div><div>In recent years, deep learning technology has shown astonishing potential in many fields, but at the same time, it also hides serious vulnerabilities. In the field of network traffic classification, attackers exploit this vulnerability to add designed perturbations to normal traffic, causing incorrect network traffic classification to implement adversarial attacks. The existing network traffic adversarial attack methods mainly target specific models or sample application scenarios, which have many problems such as poor transferability, high time cost, and low practicality. Therefore, this article proposes a method towards universal and transferable adversarial attacks against network traffic classification, which can not only perform universal adversarial attacks on all samples in the network traffic dataset, but also achieve cross data and cross model transferable adversarial attacks, that is, it has transferable attack effects at both the network traffic data and classification model levels. This method utilizes the geometric characteristics of the network model to design the target loss function and optimize the generation of universal perturbations, resulting in biased learning of features at each layer of the network model, leading to incorrect classification results. Meanwhile, this article conducted universality and transferability adversarial attack verification experiments on standard network traffic datasets of three different classification applications, USTC-TFC2016, ISCX2016, and CICIoT2023, as well as five common network models such as LeNet5. The results show that the proposed method performs universal adversarial attacks on five network models on three datasets, USTC-TFC2016, ISCX2016, and CICIoT2023, with an average attack success rate of over 80 %, 85 %, and 88 %, respectively, and an average time cost of about 0–0.3 ms; And the method proposed in this article has shown good transferable attack performance between five network models and on three network traffic datasets, with transferable attack rates approaching 100 % across different models and datasets, which is more closely related to practical applications.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110790"},"PeriodicalIF":4.4,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142319858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-13DOI: 10.1016/j.comnet.2024.110802
Truong Van Truong , Anand Nayyar
{"title":"Enhancing security offloading performance in NOMA heterogeneous MEC networks using access point selection and meta-heuristic algorithm","authors":"Truong Van Truong , Anand Nayyar","doi":"10.1016/j.comnet.2024.110802","DOIUrl":"10.1016/j.comnet.2024.110802","url":null,"abstract":"<div><p>The research delves into the intricate domain of security offloading within the context of non-orthogonal multiple access (NOMA) heterogeneous mobile edge computing (het-MEC) networks operating over Rayleigh fading channels. The investigation centers on a system model comprising a single antenna-equipped edge user, denoted as <span><math><mi>U</mi></math></span>, which strategically offloads computational tasks to two distinct heterogeneous wireless access points (APs): the far AP (<span><math><mrow><mi>A</mi><msub><mrow><mi>P</mi></mrow><mrow><mn>1</mn></mrow></msub></mrow></math></span>) and the near one (<span><math><mrow><mi>A</mi><msub><mrow><mi>P</mi></mrow><mrow><mn>2</mn></mrow></msub></mrow></math></span>), employing NOMA techniques. Notably, the research accounts for a passive eavesdropper (<span><math><mi>E</mi></math></span>) intending to intercept the <span><math><mrow><mi>U</mi><mo>−</mo><mi>A</mi><msub><mrow><mi>P</mi></mrow><mrow><mn>2</mn></mrow></msub></mrow></math></span> transmission. A four-phase protocol is proposed to ensure the security offloading process, namely SAPS, which leverages wireless access point selection (APS) and physical layer security (PLS) techniques. The focus extends to derive a closed-form expression for a novel critical system performance metric: the secrecy successful computation probability (SSCP). Furthermore, an algorithm based on Ant Colony Optimization (ACO) within the continuous domain is introduced, which aims to enhance the SSCP by intelligently determining system parameters. The impact of critical factors such as transmit power, power allocation coefficient, bandwidth, CPU frequency, and task division ratio under the SAPS scheme is explored and compared to the conventional approach using pure NOMA. Remarkably, the algorithm in the proposed scheme demonstrates up to a 3% performance improvement. The validity and accuracy of the study findings are verified through Monte-Carlo simulations. The work contributes significantly to advancing secure offloading strategies in NOMA-based MEC networks, offering valuable insights for practical deployment and optimization.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110802"},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-13DOI: 10.1016/j.comnet.2024.110759
Yan Zhang, Haopeng Huang, Qingqing Huang, Yan Han
{"title":"6TiSCH IIoT network: A review","authors":"Yan Zhang, Haopeng Huang, Qingqing Huang, Yan Han","doi":"10.1016/j.comnet.2024.110759","DOIUrl":"10.1016/j.comnet.2024.110759","url":null,"abstract":"<div><div>Low-power and Lossy Networks (LLN) constitute an interconnected network of numerous resource-constrained nodes, forming a wireless mesh network. The Time slotted Channel Hopping (TSCH) mode, introduced as a revision of the Medium Access Control (MAC) section within the IEEE 802.15.4 standard, stands as an emerging standard for industrial automation and process control. In 2013, the Internet Engineering Task Force (IETF) established the IPv6 over the TSCH mode of IEEE 802.15.4e (6TiSCH) working group (WG), defining the IPv6 deterministic wireless network—6TiSCH. This development is pivotal for advancing the broader adoption of IPv6 in industrial standards and facilitating the convergence of operational technology (OT) and information technology (IT). As of July 2023, the primary documents encompassing architecture, configuration and parameters, and Minimum Scheduling Function for the 6TiSCH protocol stack have been completed, and the status of the WG has transitioned from active to concluded. Over the past decade, the academic community has extensively researched protocol stacks related to 6TiSCH. This paper furnishes a comprehensive survey of the architecture and developmental processes underlying the 6TiSCH network, encapsulating research achievements since its inception, and delineating the challenges and prospective directions for its future development.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110759"},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-13DOI: 10.1016/j.comnet.2024.110805
Phibadeity S. Marwein , Samarendra Nath Sur , Debdatta Kandar
{"title":"Efficient load distribution in heterogeneous vehicular networks using hierarchical controllers","authors":"Phibadeity S. Marwein , Samarendra Nath Sur , Debdatta Kandar","doi":"10.1016/j.comnet.2024.110805","DOIUrl":"10.1016/j.comnet.2024.110805","url":null,"abstract":"<div><p>Vehicle movement poses significant challenges in vehicular networks, often resulting in uneven traffic distribution. Fog computing (FC) addresses this by operating at the network edge, handling specific tasks locally instead of relying solely on cloud computing (CC) facilities. There are instances where FC may need additional resources and must delegate tasks to CC, leading to increased delay and response time. This work conducts a thorough examination of previous load balancing (LB) strategies, with a specific focus on software-defined networking (SDN) and machine learning (ML) based LB within the internet of vehicles (IoV). The insights derived from this research expedite the development of SDN controller-based LB solutions in the IoV network. The authors proposes the integration of a local SDN controller (LSDNC) within the FC tier to enable localized LB, addressing delay concerns. However, the information will be available to the main SDN controller (MSDNC) too. The authors explore the concept mathematically and simulates the formulated model and subjecting it to a comprehensive performance analysis. The simulation results demonstrate a significant reduction in delay, with a 125 ms difference when 200 onboard units (OBUs) are used, compared to conventional software-defined vehicular networks (SDVN). This improvement continues to increase as the number of OBUs grows. Our model achieves the same maximum throughput as the previous model but delivers faster response times, as decisions are made locally without the need to wait for the main controller.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110805"},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-13DOI: 10.1016/j.comnet.2024.110803
Shahzaib Shaikh, Manar Jammal
{"title":"Survey of fault management techniques for edge-enabled distributed metaverse applications","authors":"Shahzaib Shaikh, Manar Jammal","doi":"10.1016/j.comnet.2024.110803","DOIUrl":"10.1016/j.comnet.2024.110803","url":null,"abstract":"<div><p>The metaverse, envisioned as a vast, distributed virtual world, relies on edge computing for low-latency data processing. However, ensuring fault tolerance – the system’s ability to handle failures – is critical for a seamless user experience. This paper analyzes existing research on fault tolerance in edge computing over the past six years, specifically focusing on its applicability to the metaverse. We identify common fault types like node failures, communication disruptions, and security issues. The analysis then explores various fault management techniques including proactive monitoring, resource optimization, task scheduling, workload migration, redundancy for service continuity, machine learning for predictive maintenance, and consensus algorithms to guarantee data integrity. While these techniques hold promise, adaptations are necessary to address the metaverse’s real-time interaction requirements and low-latency constraints. This paper analyzes existing research and identifies key areas for improvement, providing valuable research guidelines and insights to pave the way for the development of fault management techniques specifically tailored to the metaverse, ultimately contributing to a robust and secure virtual world.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110803"},"PeriodicalIF":4.4,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-12DOI: 10.1016/j.comnet.2024.110777
Yufan Fu , Xiaodong Lee , Jiuqi Wei , Ying Li , Botao Peng
{"title":"Securing the internet’s backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense","authors":"Yufan Fu , Xiaodong Lee , Jiuqi Wei , Ying Li , Botao Peng","doi":"10.1016/j.comnet.2024.110777","DOIUrl":"10.1016/j.comnet.2024.110777","url":null,"abstract":"<div><p>Domain Name System (DNS) is the backbone of the Internet infrastructure, converting human-friendly domain names into machine-processable IP addresses. However, DNS remains vulnerable to various security threats, such as cache poisoning attacks, where malicious attackers inject false information into DNS resolvers’ caches. Although efforts have been made to enhance DNS against such vulnerabilities, existing countermeasures often fall short in one or more areas: they may offer limited resistance to the collusion attack, introduce significant overhead, or require complex implementation that hinders widespread adoption. To address these challenges, this paper introduces TI-DNS+, a trusted and incentivized blockchain-based DNS resolution architecture for cache poisoning defense. TI-DNS+ introduces a <em>Verification Cache</em> exploiting blockchain ledger’s immutable nature to detect and correct forged DNS responses. The architecture also incorporates a multi-resolver <em>Query Vote</em> mechanism, enhancing the ledger’s credibility by validating each record modification through a stake-weighted algorithm. This algorithm selects resolvers as validators based on their stake proportion. To promote well-behaved participation, TI-DNS+ also implements a novel stake-based incentive mechanism that optimizes the generation and distribution of stake rewards. This ensures that incentives align with participants’ contributions, achieving incentive compatibility, fairness, and efficiency. Moreover, TI-DNS+ possesses high practicability as it requires only resolver-side modifications to current DNS. Finally, through comprehensive prototyping and experimental evaluations, the results demonstrate that our solution effectively mitigates DNS cache poisoning. Compared to competitors, our solution improves attack resistance by 1-3 orders of magnitude, while also reducing resolution latency by 5% to 68%.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110777"},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-12DOI: 10.1016/j.comnet.2024.110791
Shi Dong , Junxiao Tang , Khushnood Abbas , Ruizhe Hou , Joarder Kamruzzaman , Leszek Rutkowski , Rajkumar Buyya
{"title":"Task offloading strategies for mobile edge computing: A survey","authors":"Shi Dong , Junxiao Tang , Khushnood Abbas , Ruizhe Hou , Joarder Kamruzzaman , Leszek Rutkowski , Rajkumar Buyya","doi":"10.1016/j.comnet.2024.110791","DOIUrl":"10.1016/j.comnet.2024.110791","url":null,"abstract":"<div><p>With the wide adoption of 5G technology and the rapid development of 6G technology, a variety of new applications have emerged. A multitude of compute-intensive and time-sensitive applications deployed on terminal equipment have placed increased demands on Internet delay and bandwidth. Mobile Edge Computing (MEC) can effectively mitigate the issues of long transmission times, high energy consumption, and data insecurity. Task offloading, as a key technology within MEC, has become a prominent research focus in this field. This paper presents a comprehensive review of the current research progress in MEC task offloading. Firstly, it introduces the fundamental concepts, application scenarios, and related technologies of MEC. Secondly, it categorizes offloading decisions into five aspects: reducing delay, minimizing energy consumption, balancing energy consumption and delay, enabling high-computing offloading, and addressing different application scenarios. It then critically analyzes and compares existing research efforts in these areas.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110791"},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-12DOI: 10.1016/j.comnet.2024.110778
Nazli Tekin , Bilge Kagan Dedeturk , Vehbi Cagri Gungor
{"title":"Lifetime maximization of IoT-enabled smart grid applications using error control strategies","authors":"Nazli Tekin , Bilge Kagan Dedeturk , Vehbi Cagri Gungor","doi":"10.1016/j.comnet.2024.110778","DOIUrl":"10.1016/j.comnet.2024.110778","url":null,"abstract":"<div><p>Recently, with the advancement of Internet of Things (IoT) technology, IoT-enabled Smart Grid (SG) applications have gained tremendous popularity. Ensuring reliable communication in IoT-based SG applications is challenging due to the harsh channel environment often encountered in the power grid. Error Control (EC) techniques have emerged as a promising solution to enhance reliability. Nevertheless, ensuring network reliability requires a substantial amount of energy consumption. In this paper, we formulate a Mixed Integer Programming (MIP) model which considers the energy dissipation of EC techniques to maximize IoT network lifetime while ensuring the desired level of IoT network reliability. We develop meta-heuristic approaches such as Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO) to address the high computation complexity of large-scale IoT networks. Performance evaluations indicate that the EC-Node strategy, where each IoT node employs the most energy-efficient EC technique, yields a minimum of 8.9% extended lifetimes compared to the EC-Net strategies, where all IoT nodes employ the same EC method for a communication. Moreover, the PSO algorithm reduces the computational time by 77% while exhibiting a 2.69% network lifetime decrease compared to the optimal solution.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110778"},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint path planning and power allocation of a cellular-connected UAV using apprenticeship learning via deep inverse reinforcement learning","authors":"Alireza Shamsoshoara , Fatemeh Lotfi , Sajad Mousavi , Fatemeh Afghah , İsmail Güvenç","doi":"10.1016/j.comnet.2024.110789","DOIUrl":"10.1016/j.comnet.2024.110789","url":null,"abstract":"<div><p>This paper investigates an interference-aware joint path planning and power allocation mechanism for a cellular-connected unmanned aerial vehicle (UAV) in a sparse suburban environment. The UAV’s goal is to fly from an initial point and reach a destination point by moving along the cells to guarantee the required quality of service (QoS). In particular, the UAV aims to maximize its uplink throughput and minimize interference to the ground user equipment (UEs) connected to neighboring cellular base stations (BSs), considering both the shortest path and limitations on flight resources. Expert knowledge is used to experience the scenario and define the desired behavior for the sake of the agent (i.e., UAV) training. To solve the problem, an apprenticeship learning method is utilized via inverse reinforcement learning (IRL) based on both Q-learning and deep reinforcement learning (DRL). The performance of this method is compared to learning from a demonstration technique called behavioral cloning (BC) using a supervised learning approach. Simulation and numerical results show that the proposed approach can achieve expert-level performance. We also demonstrate that, unlike the BC technique, the performance of our proposed approach does not degrade in unseen situations.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110789"},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006212/pdfft?md5=dc7b3d1acee33e2f5feab69fccae53be&pid=1-s2.0-S1389128624006212-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142232950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-09-12DOI: 10.1016/j.comnet.2024.110800
Duschia Bodet , Jacob Hall , Ahmad Masihi , Ngwe Thawdar , Tommaso Melodia , Francesco Restuccia , Josep M. Jornet
{"title":"Data signals for deep learning applications in Terahertz communications","authors":"Duschia Bodet , Jacob Hall , Ahmad Masihi , Ngwe Thawdar , Tommaso Melodia , Francesco Restuccia , Josep M. Jornet","doi":"10.1016/j.comnet.2024.110800","DOIUrl":"10.1016/j.comnet.2024.110800","url":null,"abstract":"<div><p>The Terahertz (THz) band (0.1–10 THz) is projected to enable broadband wireless communications of the future, and many envision deep learning as a solution to improve the performance of THz communication systems and networks. However, there are few available datasets of true THz signals that could enable testing and training of deep learning algorithms for the research community. In this paper, we provide an extensive dataset of 120,000 data frames for the research community. All signals were transmitted at 165 GHz but with varying bandwidths (5 GHz, 10 GHz, and 20 GHz), modulations (4PSK, 8PSK, 16QAM, and 64QAM), and transmit amplitudes (75 mV and 600 mV), resulting in twenty-four distinct bandwidth-modulation-power combinations each with 5,000 unique captures. The signals were captured after down conversion at an intermediate frequency of 10 GHz. This dataset enables the research community to experimentally explore solutions relating to ultrabroadband deep and machine learning applications.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"254 ","pages":"Article 110800"},"PeriodicalIF":4.4,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624006327/pdfft?md5=c4870e9a435477344bfb00ccf315d922&pid=1-s2.0-S1389128624006327-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142232951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}