Computer NetworksPub Date : 2025-03-28DOI: 10.1016/j.comnet.2025.111267
Ahmed M. Alwakeel
{"title":"Enhancing IoT performance in wireless and mobile networks through named data networking (NDN) and edge computing integration","authors":"Ahmed M. Alwakeel","doi":"10.1016/j.comnet.2025.111267","DOIUrl":"10.1016/j.comnet.2025.111267","url":null,"abstract":"<div><div>Available online The rapid expansion of the Internet of Things (IoT) in wireless and mobile networks demands novel approaches for efficient data transmission and management. Traditional IP-based networking architectures struggle to meet the high-speed, low-latency, and scalable requirements of IoT. Named Data Networking (NDN), a content-centric networking paradigm, provides an alternative by focusing on data retrieval based on content names rather than device addresses. However, while NDN offers significant advantages in reducing latency and improving data dissemination, its integration with edge computing for real-time IoT applications remains suboptimal due to challenges in dynamic resource allocation, routing efficiency, and robustness under uncertain network conditions. This paper proposes a novel adaptive NDN-Edge Computing framework that dynamically optimizes data retrieval, caching, and computational resource allocation. Unlike prior studies that focus solely on theoretical models or static configurations, our framework introduces a multi-objective optimization model for balancing latency, reliability, and energy efficiency in IoT environments. Additionally, we formulate a robust optimization approach to ensure network resilience against unpredictable traffic surges, topology changes, and edge node failures. Through extensive simulations and real-world case studies, we demonstrate that the proposed integration significantly improves latency (up to 25 % reduction), energy efficiency (15 % improvement), and cache hit ratio (20 % increase) compared to conventional NDN and edge computing approaches. This work contributes to the ongoing research by providing a scalable, adaptive, and resilient NDN-edge computing framework that enhances IoT data processing while addressing critical limitations of existing solutions. Future work will focus on security enhancements and the integration of blockchain for decentralized trust management in IoT ecosystems.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"264 ","pages":"Article 111267"},"PeriodicalIF":4.4,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-27DOI: 10.1016/j.comnet.2025.111214
Jifang Wang , Shangping Wang , Duo Zhang , Qian Zhang , Yinjuan Deng
{"title":"Blockchain-based multiple auditing scheme against cheating owner in clouds","authors":"Jifang Wang , Shangping Wang , Duo Zhang , Qian Zhang , Yinjuan Deng","doi":"10.1016/j.comnet.2025.111214","DOIUrl":"10.1016/j.comnet.2025.111214","url":null,"abstract":"<div><div>Along with the commonplace of cloud outsourcing services, the problem of auditing the integrity of outsourced data without downloading has attracted much attention increasingly. However, in most existing auditing schemes, the audit only focuses on resisting undependable cloud server, rarely considers the problem of resisting cheating owner. An unreliable data owner may store the data not the same as it claimed for interest. Even worse, an undependable owner may deliver a sham message deliberately to avoid paying server for service or to cheat its deposit. To solve this problem, we propose a blockchain-based multiple auditable scheme against cheating owner by constructing a novel incremental structure, that allows for low computation and communication overheads, while providing a continuous natural flow of joint verification between storage parties over time. Specifically, our scheme is a two-way verification protocol that makes both parties consistently dependable. Besides, the incremental structure that uses a reversed recursive hash chain structure combined with blockchain and aggregate signature, makes our scheme more suitable for big data auditing. Smart contract is deployed to realize a central-free mechanism of rewards and penalties. The security analysis and simulation experiment demonstrate that the proposal is secure, dependable, efficient and practical.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111214"},"PeriodicalIF":4.4,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143725553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-27DOI: 10.1016/j.comnet.2025.111242
Md Arif Hassan , Mohammad (Behdad) Jamshidi , Bui Duc Manh , Nam H. Chu , Chi-Hieu Nguyen , Nguyen Quang Hieu , Cong T. Nguyen , Dinh Thai Hoang , Diep N. Nguyen , Nguyen Van Huynh , Mohammad Abu Alsheikh , Eryk Dutkiewicz
{"title":"Enabling technologies for Web 3.0: A comprehensive survey","authors":"Md Arif Hassan , Mohammad (Behdad) Jamshidi , Bui Duc Manh , Nam H. Chu , Chi-Hieu Nguyen , Nguyen Quang Hieu , Cong T. Nguyen , Dinh Thai Hoang , Diep N. Nguyen , Nguyen Van Huynh , Mohammad Abu Alsheikh , Eryk Dutkiewicz","doi":"10.1016/j.comnet.2025.111242","DOIUrl":"10.1016/j.comnet.2025.111242","url":null,"abstract":"<div><div>Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution has the potential to democratize content access by leveraging advancements in cutting-edge enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web, 3D interactive web, Metaverse, Virtual Reality (VR) and Augmented Reality (AR), Internet of Things (IoT) technology, and their roles in shaping Web 3.0. We commence by providing a comprehensive background of Web 3.0, including its concept, basic architecture, potential applications, and industry adoption. Subsequently, we examine recent breakthroughs in IoT, 5G, and blockchain technologies that are pivotal to Web 3.0 development. Following that, other enabling technologies, including AI, semantic web, and 3D interactive web, are discussed. Utilizing these technologies can effectively address the critical challenges in realizing Web 3.0, such as ensuring decentralized identity, platform interoperability, data transparency, reducing latency, and enhancing the system’s scalability. Finally, we highlight significant challenges associated with Web 3.0 implementation, emphasizing potential solutions and providing insights into future research directions in this field.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"264 ","pages":"Article 111242"},"PeriodicalIF":4.4,"publicationDate":"2025-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143738227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-26DOI: 10.1016/j.comnet.2025.111238
Hao Dai , Chao Zhai , Jiachao Yu , Jie Gao , Jie Tian
{"title":"Edge-caching assisted underlay spectrum sharing in large-scale cognitive radio networks","authors":"Hao Dai , Chao Zhai , Jiachao Yu , Jie Gao , Jie Tian","doi":"10.1016/j.comnet.2025.111238","DOIUrl":"10.1016/j.comnet.2025.111238","url":null,"abstract":"<div><div>Edge-caching and spectrum sharing are promising techniques to meet the fast-growing wireless transmission requirements. In this paper, we propose an edge-caching based underlay spectrum sharing scheme for a large-scale cognitive radio network. In the primary system, primary users (PUs) request files from their associated base stations. In the secondary system, secondary transmitters (STs) intend to communicate with their receivers by sharing the spectrum, and secondary helpers (SHs) actively cache the files of primary system. In the device-to-device (D2D) communication range around each PU, the SH that has cached the file requested by the PU and has the shortest distance to the PU is selected for the cooperative file transfer. With the cooperation from SHs, the transmission quality towards PUs can be greatly improved, and STs can achieve more opportunities for the spectrum sharing. An optimization problem is formulated to maximize the area throughput of secondary system under the performance constraint of primary system. We propose a low-complexity CVX-SA algorithm by decomposing the original problem into two subproblems to jointly determine the file caching policy and system critical parameters. Numerical results show that, compared with the benchmark schemes, our proposed scheme can significantly improve the area throughput of the secondary system.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111238"},"PeriodicalIF":4.4,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143734869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-26DOI: 10.1016/j.comnet.2025.111232
Dongyu Chen , Tao Deng , Juncheng Jia , Siwei Feng , Di Yuan
{"title":"Mobility-aware decentralized federated learning with joint optimization of local iteration and leader selection for vehicular networks","authors":"Dongyu Chen , Tao Deng , Juncheng Jia , Siwei Feng , Di Yuan","doi":"10.1016/j.comnet.2025.111232","DOIUrl":"10.1016/j.comnet.2025.111232","url":null,"abstract":"<div><div>Federated learning (FL) emerges as a promising approach to empower vehicular networks, composed by intelligent connected vehicles equipped with advanced sensing, computing, and communication capabilities. While previous studies have explored the application of FL in vehicular networks, they have largely overlooked the intricate challenges arising from the mobility of vehicles and resource constraints. In this paper, we propose a framework of mobility-aware decentralized federated learning (MDFL) for vehicular networks. In this framework, nearby vehicles train an FL model collaboratively, yet in a decentralized manner. We formulate a local iteration and leader selection joint optimization problem (LSOP) to improve the training efficiency of MDFL. For problem solving, we first reformulate LSOP as a decentralized partially observable Markov decision process (Dec-POMDP), and then develop an effective optimization algorithm based on multi-agent proximal policy optimization (MAPPO) to solve Dec-POMDP. Finally, we verify the performance of the proposed algorithm by comparing it with other algorithms.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111232"},"PeriodicalIF":4.4,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143734870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-26DOI: 10.1016/j.comnet.2025.111228
Francesco Cerasuolo, Giampaolo Bovenzi, Domenico Ciuonzo, Antonio Pescapè
{"title":"Attack-adaptive network intrusion detection systems for IoT networks through class incremental learning","authors":"Francesco Cerasuolo, Giampaolo Bovenzi, Domenico Ciuonzo, Antonio Pescapè","doi":"10.1016/j.comnet.2025.111228","DOIUrl":"10.1016/j.comnet.2025.111228","url":null,"abstract":"<div><div>The advent of the Internet of Things (IoT) has ushered in an era of unprecedented connectivity and convenience, enabling everyday objects to gather and share data autonomously, revolutionizing industries, and improving quality of life. However, this interconnected landscape poses cybersecurity challenges, as the expanded attack surface exposes vulnerabilities ripe for exploitation by malicious actors. The surge in network attacks targeting IoT devices underscores the urgency for <em>robust</em> and <em>evolving</em> security measures. Class Incremental Learning (CIL) emerges as a dynamic strategy to address these challenges, empowering Machine Learning (ML) and Deep Learning (DL) models to adapt to evolving threats while maintaining proficiency in detecting known ones. In the context of IoT security, characterized by the constant emergence of novel attack types, CIL offers a powerful means to enhance Network Intrusion Detection Systems (NIDS) resilience and network security. This paper aims to investigate how CIL methods can support the evolution of NIDS within IoT networks (<span><math><mi>i</mi></math></span>) <em>by evaluating both attack detection and classification tasks</em>— optimizing hyperparameters associated with the incremental update or to the traffic input definition—and (<span><math><mrow><mi>i</mi><mi>i</mi></mrow></math></span>) <em>by addressing also key research questions related to real-world NIDS challenges</em>—such as the explainability of decisions, the robustness to perturbation of traffic inputs, and scenarios with a scarcity of new-attack samples. Leveraging <em>4 recently-collected and comprehensive IoT attack datasets</em>, the study aims to evaluate the effectiveness of CIL techniques in classifying 0-day attacks.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111228"},"PeriodicalIF":4.4,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-26DOI: 10.1016/j.comnet.2025.111241
Ziwen Wang , Yajun Guo , Yimin Guo
{"title":"A blockchain-based medical IoT authentication scheme resistant to combined attacks","authors":"Ziwen Wang , Yajun Guo , Yimin Guo","doi":"10.1016/j.comnet.2025.111241","DOIUrl":"10.1016/j.comnet.2025.111241","url":null,"abstract":"<div><div>The Medical Internet of Things (MIoT) has transformed the healthcare industry by facilitating telemedicine and real-time health monitoring. In MIoT, doctors can address patients’ issues at any time and in any scenario. However, MIoT faces common data security issues in IoT applications, and the unique nature of healthcare services demands higher privacy protection. Consequently, ensuring secure communication in MIoT is imperative. Traditional MIoT Authentication and Key Agreement (AKA) protocols often use centralized methods, presenting a single point of failure. Moreover, these protocols can only resist single attacks and cannot cope with combined attacks that attackers might launch. These limitations make it difficult to meet the actual needs of MIoT. To address these issues, we propose an MIoT authentication protocol that resists combined attacks and solves single points of failure by integrating Physical Unclonable Functions (PUF), blockchain technology, and Elliptic Curve Cryptography (ECC) while introducing fog computing. Security analysis demonstrates that the proposed protocol ensures semantic security and satisfies the specified security requirements even under combined attacks. Performance analysis indicates that our protocol achieves more comprehensive security features under combined attacks and has lower consumption in several aspects.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111241"},"PeriodicalIF":4.4,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory-efficient programmable packet parsing for multi-tenant terabit networks","authors":"Xuetan Cheng , Yingwen Chen , Xiangrui Yang, Huan Zhou, Lailong Luo, Deke Guo","doi":"10.1016/j.comnet.2025.111240","DOIUrl":"10.1016/j.comnet.2025.111240","url":null,"abstract":"<div><div>Programmable data plane architectures such as RMT and dRMT obtain great attention due to their flexibility in processing packets on demand without modifying the switch chip design. Unfortunately, the packet parser, as a crucial component, suffers from low processing performance and large logic usage. Existing programmable packet parser design utilizes a Finite State Machine (FSM) to parse the packet header vector (PHV) in a loop manner, or enumerates all possible protocol paths to extract the packet header vector in parallel, which leads to low throughput or significant consumption of T-CAM resources.</div><div>This paper proposes the partition parser (PParser), a novel programmable parser design, working in multi-tenant networks, that makes the best trade-offs between the parsing performance and the resource usage as far as we are concerned. To maximize the performance, PParser initiates the protocol path analysis in compile-time and parses packets in parallel using T-CAM. To avoid the path explosion without reducing performance, PParser efficiently partitions the parsing graph into sub-graphs and leverages a multi-stage T-CAM for cascade parsing. The performance, flexibility, and resource usage of PParser are excessively evaluated using real-world protocols on the FPGA prototype. The result shows that PParser achieves 3.98<span><math><mo>×</mo></math></span> throughput compared with the FSM-based parser and 87% compression rate and a similar throughput compared with HyperParser.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"264 ","pages":"Article 111240"},"PeriodicalIF":4.4,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-25DOI: 10.1016/j.comnet.2025.111231
Bassant Tolba , Maha Elsabrouty , Mohammed Abo-Zahhad , Akira Uchiyama , Ahmed H. Abd El-Malek
{"title":"Delay-energy-aware joint multi-cell association, service caching, and task offloading in hybrid-task heterogeneous edge computing networks","authors":"Bassant Tolba , Maha Elsabrouty , Mohammed Abo-Zahhad , Akira Uchiyama , Ahmed H. Abd El-Malek","doi":"10.1016/j.comnet.2025.111231","DOIUrl":"10.1016/j.comnet.2025.111231","url":null,"abstract":"<div><div>In highly dense networks with huge computational requirements, mobile edge computing has been proposed to alleviate network traffic congestion and reduce system latency by offloading the intensive computational tasks to the network edges for execution. As a result, achieving low energy consumption and reduced system latency has become increasingly important under this paradigm. In this paper, we propose a delay-energy-aware algorithm for minimizing the overall system latency, energy consumption and balancing the load among base stations, particularly in the case of hybrid-task scenarios. A novel crafted weighted-sum objective function for the total system latency and energy consumption is designed to formulate a non-convex joint optimization problem. The Gibbs sampling algorithm is used to solve the formulated optimization problem through updating the caching and offloading decision variables. The proposed framework investigates the optimal multi-cell association, power allocation, service data caching, and computational task offloading for multi-tier communication and edge computing networks. The effect of limited quota on multi-tier heterogeneous networks is investigated under Rayleigh fading channels. Simulation results demonstrate the superiority of the proposed algorithms over the state-of-the-art works in terms of reducing the system latency and energy consumption.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"263 ","pages":"Article 111231"},"PeriodicalIF":4.4,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer NetworksPub Date : 2025-03-25DOI: 10.1016/j.comnet.2025.111236
Huaguang Shi , Jian Huang , Hengji Li , Tianyong Ao , Wei Li , Yi Zhou
{"title":"Multi-channel real-time access with starvation avoidance for heterogeneous data in smart factories","authors":"Huaguang Shi , Jian Huang , Hengji Li , Tianyong Ao , Wei Li , Yi Zhou","doi":"10.1016/j.comnet.2025.111236","DOIUrl":"10.1016/j.comnet.2025.111236","url":null,"abstract":"<div><div>In Industrial Wireless Control Networks (IWCNs), Industrial Devices (IDs) generate massive amounts of Data Packets (DPs) with different Quality of Service (QoS) requirements. However, most of the existing works set different priorities for differentiated transmission of heterogeneous data, and the high-priority DPs will access the channel immediately after they are generated. This may result in the access starvation of low-priority DPs in time-frequency resource-constrained IWCNs. In this paper, we study the collaborative transmission algorithm of heterogeneous data to avoid access starvation for lower-priority DPs while guaranteeing QoS for higher-priority DPs. Specifically, we first design an edge-assisted learning architecture with multi-access edge computing to assist the training of the algorithm. Then, to mitigate access conflicts among IDs, a gated recurrent unit enhanced Multi-Agent Deep Reinforcement Learning (MADRL) framework was adopted. Based on the framework, we propose a Multi-criteria Decision based dynamic Multi-channel Access (MDMA) algorithm, where high-priority DPs can consider waiting for access according to their own criteria to avoid preempting the channel access opportunity of low-priority DPs approaching the deadline. Extensive simulations show that the proposed MDMA algorithm outperforms the existing algorithms in terms of the average channel utilization rate and the average completion rate of heterogeneous data.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"264 ","pages":"Article 111236"},"PeriodicalIF":4.4,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143748011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}