Computer Networks最新文献

筛选
英文 中文
Blockchain-assisted Verifiable Secure Multi-Party Data Computing 区块链辅助的可验证安全多方数据计算
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-10 DOI: 10.1016/j.comnet.2024.110712
{"title":"Blockchain-assisted Verifiable Secure Multi-Party Data Computing","authors":"","doi":"10.1016/j.comnet.2024.110712","DOIUrl":"10.1016/j.comnet.2024.110712","url":null,"abstract":"<div><p>Secure multi-party computation (SMPC) is a crucial technology that supports privacy preservation, enabling multiple users to perform computations on any function without disclosing their private inputs and outputs in a distrustful environment. Existing secure multi-party computation models typically rely on obfuscation circuits and cryptographic protocols to facilitate collaborative computation of tasks. However, the efficiency and privacy leakage of users have not been paid much attention during the computation process. To address these problems, this article proposes a privacy-preserving approach <strong>B</strong>lockchain-assisted <strong>V</strong>erifiable <strong>S</strong>ecure <strong>M</strong>ulti-<strong>P</strong>arty <strong>D</strong>ata <strong>C</strong>omputing (BVS-MPDC). Specifically, to prevent privacy leakage when users and multiple participants share data, BVS-MPDC uses additive homomorphic encryption to encrypt data shares; and verifies the generated Pedersen commitment of all the data. BVS-MPDC utilizes an improved Schnorr aggregation signature to improve computation efficiency between computing nodes and smart contracts by submitting an aggregation signature to the blockchain. Moreover, we design and implement a smart contract for verifying aggregation signature results on Ethereum. The security proof is presented under the UC framework. Finally, simulation experiments of performance evaluations demonstrate that our scheme outperforms existing schemes in computation overhead and verification.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems Raiju:强化学习引导的网络系统自动安全评估后开发
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-09 DOI: 10.1016/j.comnet.2024.110706
{"title":"Raiju: Reinforcement learning-guided post-exploitation for automating security assessment of network systems","authors":"","doi":"10.1016/j.comnet.2024.110706","DOIUrl":"10.1016/j.comnet.2024.110706","url":null,"abstract":"<div><p>To discover threats to a network system, investigating the behaviors of attackers after successful exploitation is an important phase, called post-exploitation. Although various efficient tools support post-exploitation implementation, the crucial factor in completing this process remains experienced human experts, known as penetration testers or pen-testers. This study proposes the Raiju framework, a Reinforcement Learning (RL)-driven automation approach, which automatically implements steps of the post-exploitation phase for security-level evaluation. We implement two well-known RL algorithms, Advantage Actor–Critic (A2C) and Proximal Policy Optimization (PPO), to evaluate specialized agents capable of making intelligent actions. With the support of Metasploit, modules corresponding to selected actions of the agent automatically launch real attacks of privileges escalation (PE), gathering hashdump (GH), and lateral movement (LM) on multiple platforms. Through leveraging RL, our objective is to empower agents that can autonomously select suitable actions to exploit vulnerabilities within target systems. This approach enables the automation of specific components within the penetration testing (PT) workflow, thereby enhancing its efficiency and adaptability to evolving threats and vulnerabilities. The experiments are performed in four real environments with agents trained in thousands of episodes. The agents can automatically launch exploits on the four environments and achieve a success ratio of over 84% across the three attack types. Furthermore, our experiments demonstrate the remarkable effectiveness of the A2C algorithm in the realm of post-exploitation automation.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed quantum computing: A survey 分布式量子计算:调查
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-08 DOI: 10.1016/j.comnet.2024.110672
{"title":"Distributed quantum computing: A survey","authors":"","doi":"10.1016/j.comnet.2024.110672","DOIUrl":"10.1016/j.comnet.2024.110672","url":null,"abstract":"<div><p>Nowadays, quantum computing has reached the engineering phase, with fully-functional quantum processors integrating hundreds of noisy qubits. Yet – to fully unveil the potential of quantum computing out of the labs into the business reality – the challenge ahead is to substantially scale the qubit number, reaching orders of magnitude exceeding thousands of fault-tolerant qubits. To this aim, the <em>distributed quantum computing</em> paradigm is recognized as the key solution for scaling the number of qubits. Indeed, accordingly to such a paradigm, multiple small-to-moderate-scale quantum processors communicate and cooperate for executing computational tasks exceeding the computational power of single processing devices. The aim of this survey is to provide the reader with an overview about the main challenges and open problems arising with distributed quantum computing from a computer and communications engineering perspective. Furthermore, this survey provides an easy access and guide towards the relevant literature and the prominent results in the field.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005048/pdfft?md5=f68b505aaa36ec5892906577c769a4c6&pid=1-s2.0-S1389128624005048-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on green communication for wearable and implantable wireless body area networks 可穿戴和植入式无线体域网络的绿色通信综述
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110693
{"title":"A review on green communication for wearable and implantable wireless body area networks","authors":"","doi":"10.1016/j.comnet.2024.110693","DOIUrl":"10.1016/j.comnet.2024.110693","url":null,"abstract":"<div><p>In the interconnected world, where wearable devices and implantable sensors have become integral to healthcare, Wireless Body Area Networks (WBANs) play a very pivotal role. These networks enable continuous monitoring of vital signs, early detection of health issues, and personalized patient care. However, ensuring the longevity and reliability of WBANs remains a multifaceted challenge. This comprehensive survey addresses this challenge by providing key insights and practical solutions. We investigate the intricacies of indoor communication links within WBANs, characterizing wireless channels thereby revealing factors that influence the quality of the received signal. By understanding multipath propagation, small-scale fading, and interference, we empower engineers to optimize communication protocols for reliable data transmission. In particular, we describe practical path loss models that have been successfully implemented in real-world WBANs. These models account for indoor scenarios, considering floor attenuation, wall partitions, and other environmental factors.</p><p>Furthermore, we explore diverse energy harvesting (EH) techniques, from converting body movements to electrical energy to harnessing ambient RF signals. By addressing energy efficiency challenges, we extend the lifespan of WBAN devices, benefiting both patients and healthcare providers. We have also demonstrated the feasibility of incorporating EH into WBANs, via three case studies showcasing real-world validation. Finally, as the field evolves, we highlight open research problems, inviting further investigation into efficient wireless communication, seamless integration of EH techniques, and novel protocols for WBANs. In summary, this survey bridges theory and practice, fostering advancements in WBAN technology. By addressing wireless indoor channel modeling, energy efficiency, and their practical implementation in BAN, we contribute to the effectiveness of WBANs in indoor scenarios.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(User behavior)-based LS prediction model and anti-LS reverse-leadership strategy in the (VLC/RF)-V2X network (基于(用户行为)的 LS 预测模型和(VLC/RF)-V2X 网络中的反 LS 逆向领导策略
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110684
{"title":"(User behavior)-based LS prediction model and anti-LS reverse-leadership strategy in the (VLC/RF)-V2X network","authors":"","doi":"10.1016/j.comnet.2024.110684","DOIUrl":"10.1016/j.comnet.2024.110684","url":null,"abstract":"<div><p>The hybrid vehicle to everything (V2X) network based on visible light communication (VLC) and radio frequency (RF) is an excellent choice for future vehicle communication. In this paper, the (user behavior)-based longitudinal-separation (LS) prediction model and the reverse-leadership strategy in the hybrid V2X network are firstly proposed. By user behavior, the LS is divided into active separation (ASP) and passive separation (PSP). By characteristics of ASP and PSP, the longitudinal-separation prediction model is constructed. By this model, ASP and PSP can be predicted respectively before they occur. By the prediction result of the model, a reverse-leadership strategy for the platoon is presented. By this strategy, communication links can be self-adaptively changed to avoid outages caused by LS. In this scheme (model+strategy), LS can be predicted timely and communication links can be handed over in advance. Finally, the validity of the model and the effectiveness of the scheme are demonstrated by simulations based on data from NGSIM data set and PTV-Vissim simulation software. Besides, the proposed scheme not only has its comparative advantages of fewer outages and handovers, but also can decrease the path loss, average outage time and handover delay significantly.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving scalable capacity in wireless mesh networks 实现无线网状网络的可扩展容量
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110696
{"title":"Achieving scalable capacity in wireless mesh networks","authors":"","doi":"10.1016/j.comnet.2024.110696","DOIUrl":"10.1016/j.comnet.2024.110696","url":null,"abstract":"<div><p>Wireless mesh networks are critical in enabling key networking scenarios in beyond-5G (B5G) and 6G networks, including integrated access and backhaul (IAB), multi-hop sidelinks, and V2X. However, it still poses a challenge to deliver scalable per-node throughput via mesh networking. As shown in Gupta and Kumar’s seminal research (Gupta and Kumar, 2000), multi-hop transmission results in a per-node throughput of <span><math><mrow><mi>Θ</mi><mrow><mo>(</mo><mn>1</mn><mo>/</mo><msqrt><mrow><mi>n</mi><mo>log</mo><mi>n</mi></mrow></msqrt><mo>)</mo></mrow></mrow></math></span> in a wireless network with <span><math><mi>n</mi></math></span> nodes, significantly limiting the potential of large-scale deployment of wireless mesh networks. Follow-up research has achieved <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> per-node throughput in a dense network, but how to achieve scalability remains an unresolved issue for an extended wireless network where the network size increases with a constant node density. This issue prevents a wireless mesh network from large-scale deployment. To this end, this paper aims to develop a theoretical approach to achieving scalable per-node throughput in wireless mesh networks. First, the key factors that limit the per-node throughput of wireless mesh networks are analyzed, through which two major ones are identified, i.e., link sharing and interference. Next, a multi-tier hierarchical architecture is proposed to overcome the link-sharing issue. The inter-tier interference under this architecture is then mitigated by utilizing orthogonal frequency allocation between adjacent tiers, while the intra-tier interference is reduced by considering two specific transmission schemes, one is MIMO spatial multiplexing with time-division, the other is MIMO beamforming. Theoretical analysis shows that the multi-tier mesh networking architecture can achieve a per-node throughput of <span><math><mrow><mi>Θ</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> in both schemes, as long as certain conditions on network parameters including bandwidth, the number of antennas, and the number of nodes of each tier are satisfied. A case study on a realistic deployment of 10,000 nodes is then carried out, which demonstrates that a scalable throughput of <span><math><mrow><mi>Θ</mi><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mrow></math></span> is achievable with a reasonable assumption on bandwidth and the number of antennas.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141992834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced-SETL: A multi-variable deep reinforcement learning approach for contention window optimization in dense Wi-Fi networks 增强型-SETL:密集 Wi-Fi 网络中争用窗口优化的多变量深度强化学习方法
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-07 DOI: 10.1016/j.comnet.2024.110690
{"title":"Enhanced-SETL: A multi-variable deep reinforcement learning approach for contention window optimization in dense Wi-Fi networks","authors":"","doi":"10.1016/j.comnet.2024.110690","DOIUrl":"10.1016/j.comnet.2024.110690","url":null,"abstract":"<div><p>In this paper, we introduce the Enhanced Smart Exponential-Threshold-Linear (Enhanced-SETL) algorithm, a new approach that uses the multi-variable Deep Reinforcement Learning (DRL) framework to simultaneously optimize multiple settings of the Contention Window (CW) in IEEE 802.11 wireless networks. Unlike traditional DRL methods that adjust only a single CW parameter, our innovative approach simultaneously optimizes both the CW minimum (<span><math><mrow><mi>C</mi><msub><mi>W</mi><mrow><mi>m</mi><mi>i</mi><mi>n</mi></mrow></msub></mrow></math></span>) and CW Threshold (<span><math><mrow><mi>C</mi><msub><mi>W</mi><mrow><mi>T</mi><mi>h</mi><mi>r</mi><mi>e</mi><mi>s</mi><mi>h</mi><mi>o</mi><mi>l</mi><mi>d</mi></mrow></msub></mrow></math></span>), significantly improving network traffic control. We utilize a Double Deep <em>Q</em>-learning Network (DDQN) for dynamic updates of these CW settings, broadcasted across the dense Wi-Fi networks. This dual adjustment method, coupled with dynamic, data-driven updates, not only enhances throughput, but also reduces collision rates, and ensures fairness access across both static and dynamic wireless environments. Enhanced-SETL achieves a throughput improvement ranging from 3.55% up to 43.73% and from 3.98% up to 30.15% in static and dynamic scenarios over standard protocols and state-of-the-art DRL models, while maintaining a fairness index near 99% across diverse stations, showcasing its effectiveness and adaptability in various network conditions.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S138912862400522X/pdfft?md5=fe5bf107051a7089d2435b2d6188ffa5&pid=1-s2.0-S138912862400522X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative edge caching: A multi-agent deep reinforcement learning approach for cooperative replacement strategies 创新边缘缓存:合作替换策略的多代理深度强化学习方法
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-06 DOI: 10.1016/j.comnet.2024.110694
{"title":"Innovative edge caching: A multi-agent deep reinforcement learning approach for cooperative replacement strategies","authors":"","doi":"10.1016/j.comnet.2024.110694","DOIUrl":"10.1016/j.comnet.2024.110694","url":null,"abstract":"<div><p>Cooperative edge caching has emerged as a promising solution to alleviate the traffic burden of backhaul and improve the Quality of Service of 5G applications in the 5G era. Several cooperative edge caching methods alleviate the traffic burden of backhaul by transmitting contents between edge nodes cooperatively, thereby reducing the delay of content transmission. However, these methods have a limited ability to handle complex information in multi-edge scenarios, and they mainly focus on cooperation in content transmission while scarcely considering cooperation in cache replacement. As a result, they cannot effectively utilize the cache space of collaborative edges, leading to suboptimal system utility. In this paper, we propose a cache replacement strategy for cooperative edge caching based on a novel multi-agent deep reinforcement learning network. Firstly, we present a cooperative edge caching model aimed at maximizing the system throughput. Then, we formulate the cache replacement process in the cooperative edge caching system as a Markov Game (MG) model. Finally, we design a Discrete MADDPG algorithm based on a discrete multi-agent actor-critic network to derive the cache replacement strategy and effectively manage content redundancy within the system. Simulation results demonstrate that our proposed algorithm achieves higher system throughput while effectively controlling content redundancy.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security 调查网络安全漏洞和加强无人机安全的对策
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-06 DOI: 10.1016/j.comnet.2024.110695
{"title":"Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security","authors":"","doi":"10.1016/j.comnet.2024.110695","DOIUrl":"10.1016/j.comnet.2024.110695","url":null,"abstract":"<div><p>Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with time from military operations like surveillance, reconnaissance to commercial operations such as transportation, agriculture. The Drone market will be grown to around 43 billion USD by the 2025. With the increase in the usages, there is increase in cyber-attacks. So, Drone security and privacy are of major concern as they are used to perform the critical operations. The rapid adoption of UAVs in various sectors has prompted the need for robust and comprehensive cyber security measures. By implementing robust countermeasures, such as authentication, encryption etc. the risks posed by cyber threats can be significantly mitigated. The study investigates cyber security vulnerabilities and countermeasures in UAV systems within the scope of Authentication techniques, Physical Layer Security, Covert Communication. Relaying and Trajectory Optimization techniques are also discussed so that the flight trajectory can be optimized. It also discusses the communication modes used in UAV communication. An analysis of communication protocols is also carried out in this survey. The goal of the survey is to get the idea of cyber security threats involved in UAV communication. Our analysis emphasizes the importance of a holistic approach to UAV cyber security, leveraging the synergies among these domains to enhance overall resilience.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on spectrum sharing techniques for 5G/B5G intelligent wireless networks: Opportunities, challenges and future research directions 关于 5G/B5G 智能无线网络频谱共享技术的全面调查:机遇、挑战和未来研究方向
IF 4.4 2区 计算机科学
Computer Networks Pub Date : 2024-08-06 DOI: 10.1016/j.comnet.2024.110697
{"title":"A comprehensive survey on spectrum sharing techniques for 5G/B5G intelligent wireless networks: Opportunities, challenges and future research directions","authors":"","doi":"10.1016/j.comnet.2024.110697","DOIUrl":"10.1016/j.comnet.2024.110697","url":null,"abstract":"<div><p>The increasing popularity of the Internet of Everything and small-cell devices has enormously accelerated traffic loads. Consequently, increased bandwidth and high data rate requirements stimulate the operation at the millimeter wave and the Tera-Hertz spectrum bands in the fifth generation (5G) and beyond 5G (B5G) wireless networks. Furthermore, efficient spectrum allocation, maximizing the spectrum utilization, achieving efficient spectrum sharing (SS), and managing the spectrum to enhance the system performance remain challenging. To this end, recent studies have implemented artificial intelligence and machine learning techniques, enabling intelligent and efficient spectrum leveraging. However, despite many recent research advances focused on maximizing utilization of the spectrum bands, achieving efficient sharing, allocation, and management of the enormous available spectrum remains challenging. Therefore, the current article acquaints a comprehensive survey on intelligent SS methodologies for 5G and B5G wireless networks, considering the applications of artificial intelligence for efficient SS. Specifically, a thorough overview of SS methodologies is conferred, following which the various spectrum utilization opportunities arising from the existing SS methodologies in intelligent wireless networks are discussed. Subsequently, to highlight critical limitations of the existing methodologies, recent literature on existing SS methodologies is reviewed in detail, classifying them based on the implemented technology, i.e., cognitive radio, machine learning, blockchain, and multiple other techniques. Moreover, the related SS techniques are reviewed to highlight significant challenges in the B5G intelligent wireless network. Finally, to provide an insight into the prospective research avenues, the article is concluded by presenting several potential research directions and proposed solutions.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信