Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110856
Zaixing Zhu, Tao Hu, Di Wu, Chengcheng Liu, Siwei Yang, Zhifu Tian
{"title":"Topology sensing of FANET under missing data","authors":"Zaixing Zhu, Tao Hu, Di Wu, Chengcheng Liu, Siwei Yang, Zhifu Tian","doi":"10.1016/j.comnet.2024.110856","DOIUrl":"10.1016/j.comnet.2024.110856","url":null,"abstract":"<div><div>The topological structure of a flying ad hoc network (FANET) is crucial to understand, explain, and predict the behavior of unmanned aerial vehicle (UAV) swarms. Most studies focusing on topology sensing use perfect observations and complete datasets. However, the received signal dataset, being non-cooperative, commonly encounters instances of missing data, causing the performance of the existing algorithms to degrade. We investigate the issue of topology sensing of FANET based on external observations and propose a topology sensing method for FANET with missing data while introducing link-prediction methods to correct the topology inference results. First, we employ multi-dimensional Hawkes processes to model the communication event sequence in the network. Subsequently, to solve the problem in which the binary decision threshold is difficult to determine and cannot be adapted to the application scenario, we propose an extended multi-dimensional Hawkes model suitable for FANET and use the maximum likelihood estimation method for topology inference. Finally, to solve the problem of the low accuracy of inference results owing to missing data, we perform community detection on the observation network and combine the community detection and inference results to construct a mixed connection probability matrix, based on which we perform topology correction. The results of the analysis show that the topology sensing method proposed in this study is robust against missing data, indicating that it is an effective solution for solving this problem.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110856"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110870
Anjali Gupta, Abhishek Dixit
{"title":"Mathematical analysis of busy tone in full-duplex optical MAC for hidden node mitigation","authors":"Anjali Gupta, Abhishek Dixit","doi":"10.1016/j.comnet.2024.110870","DOIUrl":"10.1016/j.comnet.2024.110870","url":null,"abstract":"<div><div>This article provides the mathematical analysis of carrier sense multiple access with collision avoidance (CSMA/CA) media access control (MAC) protocol of IEEE 802.15.7 optical wireless communication (OWC). While the prior works have performed the OWC CSMA/CA mathematical analysis using the Markov models, deviation from the simulation results has been observed. We address this by improving the Markov model calculations, which display a mere 0.2% throughput deviation, nearly matching the simulation results. Furthermore, we work on the hidden node problem of the OWC networks. This problem is solved in literature by using various full-duplex communication methods, such as bi-directional data transmission and the busy tone signal; the latter is employed in our previous work on full-duplex optical MAC (FD-OMAC). These techniques increase the coverage area of the nodes by utilizing an access point (AP) as a relay node. However, the AP response is delayed by the processing time, causing an unexpected network behavior. The quantitative effect of this delay remains unexplored, which is critical for optimizing the OWC network. We bridge this gap by extending the proposed Markov analysis to model CSMA/CA and the aforementioned full-duplex techniques. This work equips readers with mathematical insights for future OWC MAC layer enhancements.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110870"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142587236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-23DOI: 10.1016/j.comnet.2024.110869
Arash GhorbanniaDelavar, Zahra Jormand
{"title":"FMORT: The Meta-Heuristic routing method by integrating index parameters to optimize energy consumption and real execution time using FANET","authors":"Arash GhorbanniaDelavar, Zahra Jormand","doi":"10.1016/j.comnet.2024.110869","DOIUrl":"10.1016/j.comnet.2024.110869","url":null,"abstract":"<div><div>Decreasing energy consumption in Unmanned Aerial Vehicles (UAVs) while simultaneously enhancing their reliability and processing capabilities is considered a fundamental challenge. The routing mechanisms employed in Flying Ad Hoc Networks (FANETs) are more complex compared to those in Mobile Ad Hoc Networks (MANETs) and Vehicular Ad Hoc Networks (VANETs), a challenge addressed by the FMORT method. To tackle these complex routing challenges, clustering techniques that utilize hybrid Meta-heuristic algorithms can be applied. Data analysis within the FMORT framework identified factors influencing service integration, leading to a reduction in redundant request transmissions and overall redundancy in the proposed method. The identification of food sources in the hybrid Meta-heuristic algorithm of the FMORT method is achieved through the integration of the Sparrow and Dragonfly algorithms. These algorithms work simultaneously to increase energy efficiency and increase network lifetime. This strategy optimizes information exchange by selecting an intelligent threshold detector and categorizing inputs, thereby minimizing node mobility. As a result, it improves performance metrics and decreases delivery costs, energy consumption, and delays. In the proposed method, a balanced performance is achieved by comparing existing methods in terms of transmission delay, Packet Delivery Ratio( PDR), throughput, and energy consumption. Simulation results show that the FMORT approach provides effective and stable outcomes in terms of reliability, decreased delays, and improved packet delivery rates. The FMORT framework includes principles for neighbor selection, determining suitable cluster heads, and scoring based on the average Euclidean distance. Additionally, it manages topology access, ensures proper distribution, guarantees data connectivity, and accurately categorizes inputs. By optimizing the sensitivity rate, this method minimizes the average delays and meekly values input data through effective load balancing. Key parameters considered for real time optimization of overall performance include the number of cluster heads during re-clustering, the ratio of request-to-acknowledgment packet transmission, node, and network lifetime, end-to-end delay, and energy consumption. Ultimately, the simulation results show that compared to the MWCRSF algorithm, the average optimization of index parameters,% 0.73 decrease in energy consumption,% 2.23 network lifetime, 1.35 re-cluster construction time and also% 0.11 re-cluster lifetime has increased.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110869"},"PeriodicalIF":4.4,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-22DOI: 10.1016/j.comnet.2024.110871
Hesham Mohammed, Dola Saha
{"title":"Encrypted-OFDM: A secured wireless waveform","authors":"Hesham Mohammed, Dola Saha","doi":"10.1016/j.comnet.2024.110871","DOIUrl":"10.1016/j.comnet.2024.110871","url":null,"abstract":"<div><div>Wireless communication has been a broadcast system since its inception, which violates security and privacy issues at the physical layer between the intended transmit and receive pairs. Consequently, it is essential to secure the wireless signal such that only the intended receiver can realize the signal properties. In this paper, we propose <span>Encrypted-OFDM</span>, a new waveform, where the signal structure is altered to encrypt the waveform with a shared secret key. We achieve the signal level security by modifying the OFDM signal in time-domain, thus erasing the OFDM properties and obfuscating the signal properties to an eavesdropper. We present a two-stage encryption algorithm to increase the robustness of the transmitted waveform and achieve a high level of secrecy, even when low entropy keys are used. We also introduce a novel channel estimation algorithm by removing the pilots, so that only the intended receiver can estimate the channel correctly. Furthermore, we perform both secrecy and error analysis for the transmitted and received <span>Encrypted-OFDM</span> waveform. Extensive simulation and over-the-air experiments show that the performance of <span>Encrypted-OFDM</span> is comparable to legacy OFDM, and the SNR penalty due to the secured waveform varies between <span><math><mo>≈</mo></math></span> 1–4 dB. In all these scenarios, <span>Encrypted-OFDM</span> remains unrecognized at the eavesdropper.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110871"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-22DOI: 10.1016/j.comnet.2024.110866
Ruidong Zhang, Jiadong Zhang, Xue Wang, Wenxiao Shi
{"title":"Utility optimization for computation offloading and splitting in time-varying HAP and LEO satellite integrated MEC networks","authors":"Ruidong Zhang, Jiadong Zhang, Xue Wang, Wenxiao Shi","doi":"10.1016/j.comnet.2024.110866","DOIUrl":"10.1016/j.comnet.2024.110866","url":null,"abstract":"<div><div>To provide ubiquitous and low-latency communication and computation services for remote and disaster areas, high altitude platform (HAP) and low earth orbit (LEO) satellite integrated multi-access edge computing (HLS-MEC) networks have emerged as a promising solution. However, most current studies directly assume that the number of connected satellites is fixed and neglect the modeling of the time-varying multi-satellite computing process. Motivated by this, we establish an M/G/K(t) queuing model to illustrate task computation on satellites. To evaluate the efficiency and quality of computation offloading and splitting, we develop a utility model. This model is defined as a difference between a value function that assesses the trade-offs of task offloading, considering latency reductions and energy savings, and a cost function that quantifies expenses related to latency and energy consumption. After formulating the utility maximization problem, we propose the deep reinforcement learning-based offloading and splitting (DBOS) scheme that can overcome the time-varying uncertainties and high dynamics in the HLS-MEC network. Specifically, the DBOS scheme can learn the best computation offloading and splitting policy to maximize the utility by sensing the number of connected satellites, the distance between the HAP and satellites, the available computing resources, and the task arrival rate. Finally, we evaluate and validate the computational complexity and convergence property of the DBOS scheme. Numerical results show that the DBOS scheme outperforms the other three benchmarks and maximizes the utility under time-varying dynamics.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110866"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-22DOI: 10.1016/j.comnet.2024.110865
Lei Yang , Juan A. Fraire , Kanglian Zhao , Ruhai Wang , Wenfeng Li , Hong Yang
{"title":"Optimizing deep-space DTN congestion control via deep reinforcement learning","authors":"Lei Yang , Juan A. Fraire , Kanglian Zhao , Ruhai Wang , Wenfeng Li , Hong Yang","doi":"10.1016/j.comnet.2024.110865","DOIUrl":"10.1016/j.comnet.2024.110865","url":null,"abstract":"<div><div>This paper introduces an innovative congestion control mechanism for delay/disruption-tolerant networking (DTN) within deep-space communication systems, leveraging the nuanced capabilities of deep reinforcement learning (DRL). This approach significantly departs from traditional methods, addressing the unique challenges of deep-space data transmissions. The proposed DRL-based strategy demonstrates a superior balance of critical factors, including transmission delay, energy efficiency, and data reception integrity. We assess our approach through meticulous simulation and comparison with established benchmark schemes. The findings underscore the mechanism’s enhanced performance metrics, positing it as an appealing solution in the evolving landscape of non-terrestrial networking.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110865"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Hybrid Congestion Mitigation Strategy for ‘6LoWPAN-RPL based patient-centric IoHT’","authors":"Himanshu Verma , Naveen Chauhan , Lalit Kumar Awasthi","doi":"10.1016/j.comnet.2024.110862","DOIUrl":"10.1016/j.comnet.2024.110862","url":null,"abstract":"<div><div>The <em>Internet of Healthcare Things</em> (IoHT) is rapidly evolving, providing new opportunities to enhance healthcare delivery. However, the resource limitation of connected medical sensing devices leads to congestion, resulting in reduced network performance, delayed data transmission, and loss of critical medical information, which can have significant consequences in healthcare. To address this issue, this paper proposes an Enhanced Hybrid Congestion Mitigation Strategy (EHCMS) for <em>IPv6 over low-power wireless personal area networks (6LoWPAN)</em> and <em>routing protocol for low-Power and lossy networks (RPL)</em> based patient-centric IoHT (PC-IoHT). The EHCMS combines several techniques, including traffic management, network topology optimization, and load balancing, to enhance network performance and reduce congestion. The proposed framework is a hybrid strategy that utilizes resource- and traffic-control mechanisms to alleviate congestion in the 6LoWPAN-RPL-based patient-centric IoHT network. For the resource-control-based approach, a congestion-aware composite objective function is designed using a few congestion-specific routing metrics and formulated as a multi-attribute decision-making problem solved using Grey relational analysis (GRA). In addition, a non-linear multi-criteria optimization problem-based transmission rate adaptation mechanism is contrived as a traffic-control scheme for congestion mitigation. The effectiveness of the proposed EHCMS is evaluated using simulations on the <em>Cooja</em> simulator in the <em>Contiki-3.0 OS</em> and compared with existing congestion-alleviating strategies. The results demonstrate that the proposed framework can significantly reduce congestion in the IoHT network, perform better than existing works, and improve the quality of service. This research paper contributes to the field of IoHT by proposing an effective congestion mitigation strategy that enhances the reliability and performance of the PC-IoHT network, ultimately improving the quality of healthcare delivery.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110862"},"PeriodicalIF":4.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142552344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-21DOI: 10.1016/j.comnet.2024.110850
Yingzhuo Deng, Zicheng Hu, Weihao Xu, Ningning Han, Haibin Cai
{"title":"Collaborative resource allocation in computing power networks: A game-theoretic double auction perspective","authors":"Yingzhuo Deng, Zicheng Hu, Weihao Xu, Ningning Han, Haibin Cai","doi":"10.1016/j.comnet.2024.110850","DOIUrl":"10.1016/j.comnet.2024.110850","url":null,"abstract":"<div><div>The growth of global data is increasing exponentially, leading to a greater demand for computing power. To address this requirement, expanding computing power from the cloud to the edge is essential. However, this transformation presents two significant challenges: how to share computing resources more efficiently and how to optimize resource allocation. To tackle these challenges, we propose a three-layer Computing Power Network (CPN) framework that focuses on implementing the collaborative allocation of computing nodes and user tasks. We formulate the resource allocation problem in CPN as a double auction game and use an experience-weighted attraction algorithm that enables participants to adjust bidding strategies based on environmental interactions. We implemented a prototype of our proposed CPN framework and conducted extensive experiments to verify our algorithm’s convergence and evaluate the benefits obtained by buyers (users) and sellers (computing nodes) from the perspective of transaction prices, rewards, and average pricing. The comprehensive experimental results demonstrate the effectiveness of our proposed method. Compared with state-of-the-art pricing strategies, our approach achieves a 20% increase in convergence speed and an 88% increase in overall returns. Furthermore, it also exhibits a 2.5% increase in deal prices and a substantial 83% rise in the income of individual users. These outcomes convincingly prove the superiority of our method in achieving better convergence, improving overall returns, and benefiting both buyers and sellers in the CPN resource auction market.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110850"},"PeriodicalIF":4.4,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-20DOI: 10.1016/j.comnet.2024.110829
Jie Chen, Jian Luo, Kai Gao
{"title":"NetBoost: Towards efficient distillation and service differentiation of network information exposure","authors":"Jie Chen, Jian Luo, Kai Gao","doi":"10.1016/j.comnet.2024.110829","DOIUrl":"10.1016/j.comnet.2024.110829","url":null,"abstract":"<div><div>Exposing network information such as distances between end hosts is useful to improve the quality of experiences for network users. Network providers calculate such information based on private topology and routing data and share it with users through well-established protocols such as Application-Layer Traffic Optimization. However, it is usually not intended to expose the original model, which can face scalability, user heterogeneity, efficacy & efficiency challenges.</div><div>In this paper, we introduce NetBoost, a system that efficiently distills and differentiates ALTO-based network information to address these challenges concurrently. NetBoost significantly reduces the size of exposed network information by orders of magnitude. In particular, by utilizing a gradient boosting algorithm for classification and regression based on IP prefix matching, NetBoost provides high-order information exposure models, allowing network providers to offer differentiated services to clients with privacy-preserving. Our experimental results demonstrate that NetBoost performs effectively in resource-constrained scenarios, surpassing state-of-the-art lossy compression algorithms and achieving greater accuracy than the XGBoost gradient boosting algorithm, while maintaining a comparable compression rate. Furthermore, in simulation experiments conducted using the real-world networking software BIND, NetBoost achieved 6.96% and 5.2% higher accuracy compared to XGBoost under the same number of rules, with NetBoost’s accuracy set at 95% and 90%, respectively. Additionally, NetBoost reduced resolve time by 44.35% and 52.47%, respectively.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110829"},"PeriodicalIF":4.4,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2024-10-19DOI: 10.1016/j.comnet.2024.110863
Guangcan Yang , Peixuan Li , Yang Xin , Yunhua He , Chao Wang , Xiubo Chen
{"title":"An efficient hierarchical attribute-based encryption scheme with cross-domain data sharing","authors":"Guangcan Yang , Peixuan Li , Yang Xin , Yunhua He , Chao Wang , Xiubo Chen","doi":"10.1016/j.comnet.2024.110863","DOIUrl":"10.1016/j.comnet.2024.110863","url":null,"abstract":"<div><div>With the rapid advancement of data sharing technology, an increasing amount of data is being stored on cloud servers. To enable fine-grained access control over the data stored on cloud servers, the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology has been widely adopted. Recognizing that shared data and files often possess a hierarchical structure, hierarchical CP-ABE technology has been proposed recently. However, most existing schemes are restricted to single-domain data access, which limits their flexibility and universal applicability in practical applications. To address this limitation, an access control scheme based on hierarchical CP-ABE, named CDS-CP-ABE, is proposed to facilitate secure and efficient cross-domain data sharing. The scheme is capable of not only realizing fine-grained hierarchical access control within a single domain but also enabling cross-domain data sharing. Security analysis confirms that our scheme effectively resists chosen-plaintext attack. Furthermore, empirical results indicate that the time consumption associated with our scheme is lower compared to other existing schemes.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"255 ","pages":"Article 110863"},"PeriodicalIF":4.4,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142533942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}