IEEE Transactions on Network Science and Engineering最新文献

筛选
英文 中文
Transaction Workload-Aware Rebalancing Optimization Scheme for Payment Channel Networks 面向交易工作负载的支付通道网络再平衡优化方案
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-17 DOI: 10.1109/TNSE.2026.3665621
Qingqing Cai;Gang Sun;Haoxiang Luo;Hongfang Yu;Mohsen Guizani
{"title":"Transaction Workload-Aware Rebalancing Optimization Scheme for Payment Channel Networks","authors":"Qingqing Cai;Gang Sun;Haoxiang Luo;Hongfang Yu;Mohsen Guizani","doi":"10.1109/TNSE.2026.3665621","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3665621","url":null,"abstract":"The Payment Channel Network (PCN) is an effective Layer-2 solution for addressing the scalability issues of blockchain-based cryptocurrencies. However, in practice, payment channels often suffer from balance depletion on one side, preventing further transactions from being executed through that channel. Rebalancing methods can alleviate this issue by actively shifting available balances across different payment channels to replenish depleted ones at minimal cost. However, existing rebalancing methods often determine the target balance of each channel subjectively, without ensuring that the rebalancing operation effectively increases the total value of executable transactions or maximizes balance-shifting efficiency within the PCN. To address these limitations, this paper establishes rebalancing evaluation models to quantify the impact of individual rebalancing operations on the total executable transaction value within the PCN. Based on these models, we design a hybrid rebalancing method that adaptively adjusts the rebalancing operation type, target balance, and participant selection according to the available balance and transaction workload of each payment channel, thereby maximizing the overall benefit of rebalancing operations on the total executed transaction value of the PCN. Experimental results demonstrate that our method improves the transaction success rate by up to 34.7% and reduces the average transaction latency by up to 4.4% compared with existing methods.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6995-7013"},"PeriodicalIF":7.9,"publicationDate":"2026-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatio-Temporal Coordinated Operation Strategy of Data Centers Considering Virtual Storage System via Two-Stage Distributionally Robust Optimization 基于两阶段分布鲁棒优化的虚拟存储数据中心时空协同运行策略
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-17 DOI: 10.1109/TNSE.2026.3665604
Xuexue Qin;Zening Li;Zhengmao Li;Yixun Xue;Xinyue Chang;Jia Su;Xiaolong Jin;Peng Wang;Hongbin Sun
{"title":"Spatio-Temporal Coordinated Operation Strategy of Data Centers Considering Virtual Storage System via Two-Stage Distributionally Robust Optimization","authors":"Xuexue Qin;Zening Li;Zhengmao Li;Yixun Xue;Xinyue Chang;Jia Su;Xiaolong Jin;Peng Wang;Hongbin Sun","doi":"10.1109/TNSE.2026.3665604","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3665604","url":null,"abstract":"Energy consumption in data centers is growing rapidly in recent years. To realize the economic and flexible operation of data centers, this paper proposes a spatio-temporal coordinated operation strategy of data centers considering virtual storage system (VSS) via two-stage distributionally robust optimization. First, based on the dynamic thermal network of buildings and differentiated demands of cloud users in data centers, a comprehensive operation model with VSS is proposed. Then, considering uncertainties of general load demands from data centers and outdoor temperatures, a fuzzy set is deduced, using an imprecise Dirichlet model derived from historical data. This ensures confidence level satisfaction for uncertain sets of general load and outdoor temperatures. In addition, the spatio-temporal coordinated operation strategy of data centers considering virtual storage system via two-stage distributionally robust optimization that flexibly adjusts conservativeness through uncertainty regulation parameters. Finally, a Dynamic Accuracy Column and Constraint Generation (DA-C&CG) algorithm is developed for solving the proposed strategy. The results indicate that the proposed strategy can effectively enhance operational economics, computing efficiency and resilience by leveraging flexibility in cooling and cloud user loads within suitable server temperatures. Meanwhile, the DA-C&CG algorithm exhibits excellent solution performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7343-7357"},"PeriodicalIF":7.9,"publicationDate":"2026-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147440586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-Mounted RIS-Assisted Legitimate Surveillance Over Maritime Low-Altitude Communication Networks 在海上低空通信网络上,无人机搭载的ris辅助合法监视
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-16 DOI: 10.1109/TNSE.2026.3665466
Wei Wang;Xu Hao;Lei Wu;Feng Zeng;Nan Zhao;Kanapathippillai Cumanan;Emil Björnson
{"title":"UAV-Mounted RIS-Assisted Legitimate Surveillance Over Maritime Low-Altitude Communication Networks","authors":"Wei Wang;Xu Hao;Lei Wu;Feng Zeng;Nan Zhao;Kanapathippillai Cumanan;Emil Björnson","doi":"10.1109/TNSE.2026.3665466","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3665466","url":null,"abstract":"This paper considers a challenging maritime low-altitude surveillance issue, in which, a legitimate monitor UAV intends to overhear a suspicious UAV-vessel link with the help of a jammer UAV. Both the suspicious receiver has the jamming detection ability and the jammer UAV is energy-constrained. To address these challenges, we propose a novel UAV-mounted reconfigurable intelligent surface (RIS) assisted approach, where the RIS is deployed on the jammer UAV to create an additional surveillance channel towards the legitimate UAV. Furthermore, the jammer UAV can also intelligently adjust its power allocation and flight trajectory to covertly disturb the suspicious transmission with the detection thresholds and the energy budgets. In such a setup, we consider a sum eavesdropping rate maximization problem of the legitimate UAV during all time slots. This formulated problem is solved by jointly optimizing the three-dimensional (3D) trajectory of the legitimate UAV, the reflecting phase shifts of the RIS, as well as the 3D trajectory and jamming power of the jammer UAV under the mobility, covertness, and power limitation constraints. We decompose the non-convex design problem into three subproblems and propose an iterative algorithm to find its approximated optimal solution by using the block coordinate descent method. In each iteration, we utilize the successive convex approximation and phase alignment techniques to handle these subproblems. Numerical simulation results are provided to validate the effectiveness and tremendous potential of UAV-mounted RIS in the maritime low-altitude surveillance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6944-6957"},"PeriodicalIF":7.9,"publicationDate":"2026-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EcoShield: A More Practical Rerouting-Based Defense Against Link Flooding Attacks EcoShield:一种更实用的基于重路由的链路泛洪攻击防御方法
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-13 DOI: 10.1109/TNSE.2026.3664638
Can Chen;Qinghao Wang;Ning Lu;Wenbo Shi;Zhiquan Liu
{"title":"EcoShield: A More Practical Rerouting-Based Defense Against Link Flooding Attacks","authors":"Can Chen;Qinghao Wang;Ning Lu;Wenbo Shi;Zhiquan Liu","doi":"10.1109/TNSE.2026.3664638","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664638","url":null,"abstract":"Link Flooding Attack (LFA) is a type of distributed denial-of-service attack that isolates the victim area from the network by indirectly overwhelming critical upstream links. This indirect nature forces the victim area to rely on upstream networks for collaborative defense against LFA. For upstream networks, rerouting serves as a rapid and effective defense strategy. However, each rerouting incurs costs for the upstream network, making it reluctant to assist the victim without compensation. Therefore, we propose EcoShield, in which rerouting is regarded as a tradable service and the victim can purchase from relevant networks when needed. To implement EcoShield, we face two challenges: building a collaboration platform to ensure fair service trading and minimizing the victim’s defense expense. To this end, we propose a blockchain-based collaborative architecture for rerouting service trading. Furthermore, we propose a cost-efficient collaborative rerouting scheme toward suspicious source domains, which effectively reduces the number of reroutings required, thereby reducing the victim’s expense. Finally, extensive experiments demonstrate that, while ensuring effective defense performance (with a botnet identification <italic>precision</i> above 0.95 and <italic>recall</i> above 0.6), EcoShield reduces the defense expense by at least 45% compared with prior works.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7014-7030"},"PeriodicalIF":7.9,"publicationDate":"2026-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneity-Aware Proactive MAC for Efficient Resource Allocation in WBANs 基于异构感知的wban资源有效分配的主动MAC
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-13 DOI: 10.1109/TNSE.2026.3664406
Yurui Zhang;Xuxun Liu;Anfeng Liu
{"title":"Heterogeneity-Aware Proactive MAC for Efficient Resource Allocation in WBANs","authors":"Yurui Zhang;Xuxun Liu;Anfeng Liu","doi":"10.1109/TNSE.2026.3664406","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664406","url":null,"abstract":"Efficient Medium Access Control (MAC) protocols are essential for reliable and real-time data transmission in Wireless Body Area Networks (WBANs). However, existing solutions, such as the IEEE 802.15.6 standard and other adaptive TDMA protocols, fail to adequately address the inherent challenges of node heterogeneity and network dynamics, which lead to inefficient resource allocation, unreliable emergency handling, and inflexible Quality-of-Service (QoS) provisioning. In this article, we propose a Heterogeneity-Aware Proactive MAC (HAP-MAC) protocol that introduces a novel three-tier holistic framework for resource allocation. Unlike conventional methods reliant on static priorities or slow centralized adaptations, HAP-MAC enables intelligent and autonomous node-state adaptation based on real-time buffer status, delay constraints, and channel quality. It employs a predictive channel access mechanism for microsecond-scale arbitration and a sophisticated multi-dimensional priority framework that comprehensively evaluates traffic characteristics, data volume, buffer conditions, and time sensitivity, thus ensuring precise QoS differentiation for diverse application requirements. Extensive experimental results demonstrate that HAP-MAC delivers significant performance advantages over state-of-the-art protocols in terms of total throughput, packet delivery rate, average delay, and channel utilization. HAP-MAC exhibits a unique ability to simultaneously address node heterogeneity and network dynamics, making it an ideal solution for mission-critical healthcare monitoring applications.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6843-6854"},"PeriodicalIF":7.9,"publicationDate":"2026-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147299497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ParallelGSE: Efficient and Secure Shortest Path Search on Encrypted Graphs 并行gse:高效安全的加密图最短路径搜索
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-12 DOI: 10.1109/TNSE.2026.3664315
Qing Fan;Weixiao Wang;Chuan Zhang;Zhitao Guan;Yong Xie;Ming Lu;Liehuang Zhu
{"title":"ParallelGSE: Efficient and Secure Shortest Path Search on Encrypted Graphs","authors":"Qing Fan;Weixiao Wang;Chuan Zhang;Zhitao Guan;Yong Xie;Ming Lu;Liehuang Zhu","doi":"10.1109/TNSE.2026.3664315","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664315","url":null,"abstract":"Graph searchable encryption (GSE) for shortest path queries allows users to discover the closest connection between two individuals in encrypted social network graphs, while safeguarding both social data security and the privacy of user queries. The static GSE is commonly favored for its higher efficiency, while it faces significant challenges in resisting query recovery attacks. In contrast, the dynamic GSE is better suited for changing real world, but enhancing its search efficiency remains a formidable challenge. In this paper, we propose the ParallelGSE, a flexible graph partitioning and parallel search framework that supports both dynamic and static encrypted social graphs, striking a balance between query privacy and practical implementation. ParallelGSE partitions the original graph into multiple subgraphs, distributes them across several semi-honest servers, and performs searches in parallel without relying on a trusted server. Formal security reduction demonstrates ParallelGSE is resistant to isomorphic query recovery attacks. Simulated experiments on seven real-world graph datasets validate rationality of graph partition and improvements of storage, computation and communication costs. Especially, compared to the state-of-the-art (SOTA) static PathGES (ACM CCS 2024) and dynamic GraphShield (IEEE TKDE 2022), the search efficiency of static ParallelGSE can be 3 orders of magnitude faster than that of PathGSE, while dynamic ParallelGSE achieves over <inline-formula><tex-math>$20times$</tex-math></inline-formula> greater search efficiency than GraphShield.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7031-7050"},"PeriodicalIF":7.9,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Detection for Bitcoin Mixing Services Using Heterogeneous Representation Learning 基于异构表示学习的比特币混合服务细粒度检测
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-12 DOI: 10.1109/TNSE.2026.3664284
Yan Wu;Jiahang Sun;Zhen Li;Cong Wu;Zhe Guo;Yi Ding;Jun Jin;Jincheng An;Chuan Zhang;Zijian Zhang;Meng Li;Liehuang Zhu
{"title":"Fine-Grained Detection for Bitcoin Mixing Services Using Heterogeneous Representation Learning","authors":"Yan Wu;Jiahang Sun;Zhen Li;Cong Wu;Zhe Guo;Yi Ding;Jun Jin;Jincheng An;Chuan Zhang;Zijian Zhang;Meng Li;Liehuang Zhu","doi":"10.1109/TNSE.2026.3664284","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664284","url":null,"abstract":"With the widespread adoption of cryptocurrencies, exemplified by Bitcoin, mixing services have been increasingly misused for illicit activities such as fraud, extortion, and money laundering. These services cut off the direct link between input and output addresses to conceal publicly available transaction traces on the blockchain, thereby evading regulatory investigations. In recent years, significant efforts have been made to deanonymize Bitcoin mixing services (BMS). While these efforts have yielded some achievements in service detection, they still face several challenges, such as vague theoretical definitions, coarse-grained identification capabilities, and insufficient labeling information. To address these challenges, this paper formalizes the notion of BMS with a syntax, security model, and goals, providing a universal definition for evaluating service anonymity and detection feasibility. We also propose a fine-grained detection framework for BMS, called BMS-FDET, which leverages heterogeneous Bitcoin transactional networks and multiple attention mechanisms to identify mixing transactions across different services. To improve the model’s detection capabilities and compare performance, a sufficient ground-truth dataset with over 596,200 entries covering more than 15 mixing services is built from extensive data sources. Comprehensive experiments demonstrate the superiority of BMS-FDET over existing methods.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7069-7083"},"PeriodicalIF":7.9,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Jamming and Transmission Rate Optimization for Multi-Jammer Assisted UAV Covert Communications With Imperfect CSI 非完美CSI下多干扰机辅助无人机隐蔽通信联合干扰与传输速率优化
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-12 DOI: 10.1109/TNSE.2026.3664087
Zhijun Han;Yiqing Zhou;Ningzhe Shi;Jingya Yang;Ling Liu;Jinglin Shi;Shuwu Chen
{"title":"Joint Jamming and Transmission Rate Optimization for Multi-Jammer Assisted UAV Covert Communications With Imperfect CSI","authors":"Zhijun Han;Yiqing Zhou;Ningzhe Shi;Jingya Yang;Ling Liu;Jinglin Shi;Shuwu Chen","doi":"10.1109/TNSE.2026.3664087","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664087","url":null,"abstract":"Information security and privacy are critical for unmanned aerial vehicles (UAV) based low-altitude networks. To enhance the security of the UAV transmitter, this paper investigates the jammer-assisted UAV covert communication systems with imperfect channel state information (CSI), where a subset of friendly jammers is selected to send artificial noise (AN) to confuse the warden. It is important to jointly optimize the jammer selection and jamming power, as AN sent by friendly jammers will interfere with the warden and receiver, simultaneously. However, existing channel-aware schemes work with a perfect CSI of the transmitter-to-receiver and jammer-to-receiver links, which is impractical in low-altitude networks. Therefore, this paper concerns the imperfect CSI of the transmitter-to-receiver link, and the channel distribution information (CDI) of both the transmitter-to-warden and jammer-related links. First, given the imperfect CSI, the warden's average detection error probability (WADEP) is analyzed. Then, given that WADEP is higher than the covertness constraint, the covert throughput is analytically derived and maximized by jointly optimizing the jammer selection, jamming power, and transmission rate (J-JamSPRImCSI). Since the optimization problem is NP-hard, a two-step Jensen's inequality based algorithm is proposed to provide a heuristic solution (2-Step-JIHA). Numerical results show that the proposed 2-Step-JIHA can provide a near optimal covert throughput with a lower complexity. Moreover, when the CSI is imperfect, compared to the existing channel-aware scheme, the proposed J-JamSPR-ImCSI with 2-Step-JIHA can improve the covert throughput by 54.26<inline-formula><tex-math>$%$</tex-math></inline-formula>, when the covertness constraint is 0.9.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6958-6976"},"PeriodicalIF":7.9,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixing Drone Auth: A Practical and Secure, Blockchain-Enabled UAV Authentication Scheme 固定无人机认证:一个实用和安全的,支持区块链的无人机认证方案
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-11 DOI: 10.1109/TNSE.2026.3663713
Jiayin Wang;Chang Xu;Liehuang Zhu;Junke Duan
{"title":"Fixing Drone Auth: A Practical and Secure, Blockchain-Enabled UAV Authentication Scheme","authors":"Jiayin Wang;Chang Xu;Liehuang Zhu;Junke Duan","doi":"10.1109/TNSE.2026.3663713","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3663713","url":null,"abstract":"Uncrewed aerial vehicles (UAVs) are increasingly deployed in safety-critical and privacy-sensitive applications, including infrastructure inspection, precision agriculture, emergency response, and on-demand connectivity. However, UAVs' mobility and intermittent connectivity expose them to diverse security threats, making robust yet efficient authentication and key agreement (AKA) essential. We present PSB-UAKA, a <underline>P</u>ractical and <underline>S</u>ecure <underline>B</u>lockchain-enabled <underline>U</u>AV <underline>A</u>uthentication and <underline>K</u>ey <underline>A</u>greement scheme. PSB-UAKA combines physical unclonable functions (PUFs) with fuzzy extractors to avoid maintaining a challenge–response pair (CRP) database while improving resilience to device-capture attacks. It further leverages Merkle-tree proofs for lightweight authorization verification and adopts session-bound pseudonym rotation to support unlinkability and tolerate desynchronization. We formalize a UAV-specific threat model and prove session authenticity and key indistinguishability in the Real-or-Random (RoR) framework. Our comparative analysis shows that PSB-UAKA provides roughly 25% broader security coverage than representative baselines, with notable gains in anonymity and desynchronization resilience. Experimental results indicate low computational overhead (below 0.066 ms on user devices and 1.436 ms on UAVs) and up to 54% reduction in UAV-side storage. Finally, extensive NS-3 simulations under realistic mobility and wireless conditions demonstrate lower authentication latency and stable throughput relative to state-of-the-art schemes, suggesting that PSB-UAKA is practical for real-world UAV deployments.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7051-7068"},"PeriodicalIF":7.9,"publicationDate":"2026-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm Intelligence Based Social-Aware Edge Caching in D2D-Enabled Wireless Networks 基于群体智能的二维无线网络社会感知边缘缓存
IF 7.9 2区 计算机科学
IEEE Transactions on Network Science and Engineering Pub Date : 2026-02-10 DOI: 10.1109/TNSE.2026.3663170
Jianbo Du;Yuting Wang;Jing Jiang;Defeng Ren;Yuan Gao;Geng Sun;Xiaoli Chu
{"title":"Swarm Intelligence Based Social-Aware Edge Caching in D2D-Enabled Wireless Networks","authors":"Jianbo Du;Yuting Wang;Jing Jiang;Defeng Ren;Yuan Gao;Geng Sun;Xiaoli Chu","doi":"10.1109/TNSE.2026.3663170","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3663170","url":null,"abstract":"This paper investigates social-aware edge caching in device-to-device (D2D) networks with multiple user equipments (UEs). Each file is encoded hierarchically and divided into multiple layers of sub-files, allowing each UE to cache partial layers and share them with others via D2D links. The system operates in discrete time slots, where contents can be retrieved in the following order: local cache, socially-connected D2D peers, and remote content servers. D2D sharing is restricted to users with social ties, quantified by a multi-attribute model combining interest similarity and social trust. We intend to maximize total backhaul bandwidth savings by jointly optimizing content placement, D2D user pairing, and base station (BS) bandwidth allocation, under constraints on storage capacity, unique pairing, total BS bandwidth, and service delay, etc. Given the NP-hardness of this joint optimization problem, we propose an Improved Constrained Fireworks Algorithm (ICFWA) that efficiently explores the solution space with low complexity and strong global search capability. In the algorithm, each firework or spark represents a feasible solution encompassing the three types of decision variables. Three explosion strategies are designed by modifying one category of variables for local search, and Gaussian mutation simultaneously modifies all variables to enhance global exploration. Simulation results demonstrate that ICFWA exhibits strong convergence performance and significantly outperforms baseline methods in maximizing backhaul bandwidth savings.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7283-7302"},"PeriodicalIF":7.9,"publicationDate":"2026-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147440525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书