Journal of Network and Computer Applications最新文献

筛选
英文 中文
Poisoning behavioral-based worker selection in mobile crowdsensing using generative adversarial networks 使用生成对抗网络的移动群体感知中基于中毒行为的工人选择
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-11 DOI: 10.1016/j.jnca.2025.104236
Ruba Nasser , Ahmed Alagha , Shakti Singh , Rabeb Mizouni , Hadi Otrok , Jamal Bentahar
{"title":"Poisoning behavioral-based worker selection in mobile crowdsensing using generative adversarial networks","authors":"Ruba Nasser ,&nbsp;Ahmed Alagha ,&nbsp;Shakti Singh ,&nbsp;Rabeb Mizouni ,&nbsp;Hadi Otrok ,&nbsp;Jamal Bentahar","doi":"10.1016/j.jnca.2025.104236","DOIUrl":"10.1016/j.jnca.2025.104236","url":null,"abstract":"<div><div>With the widespread adoption of Artificial intelligence (AI), AI-based tools and components are becoming omnipresent in today’s solutions. However, these components and tools are posing a significant threat when it comes to adversarial attacks. Mobile Crowdsensing (MCS) is a sensing paradigm that leverages the collective participation of workers and their smart devices to collect data. One of the key challenges faced at the selection stage is ensuring task completion due to workers’ varying behavior. AI has been utilized to tackle this challenge by building unique models for each worker to predict their behavior. However, the integration of AI into the system introduces vulnerabilities that can be exploited by malicious insiders to reduce the revenue obtained by victim workers. This work proposes an adversarial attack targeting behavioral-based selection models in MCS. The proposed attack leverages Generative Adversarial Networks (GANs) to generate poisoning points that can mislead the models during the training stage without being detected. This way, the potential damage introduced by GANs on worker selection in MCS can be anticipated. Simulation results using a real-life dataset show the effectiveness of the proposed attack in compromising the victim workers’ model and evading detection by an outlier detector, compared to a benchmark. In addition, the impact of the attack on reducing the payment obtained by victim workers is evaluated.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104236"},"PeriodicalIF":7.7,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144289942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clear data, clear roads: Imputing missing data for enhanced intersection flow of connected autonomous vehicles 清晰的数据,清晰的道路:输入缺失的数据,以增强互联自动驾驶汽车的交叉路口流量
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-11 DOI: 10.1016/j.jnca.2025.104233
M. Freire , A. Maia , G. Figueiredo , C. Prazeres , W. Lobato , L. Villas , C. Sommer , M. Peixoto
{"title":"Clear data, clear roads: Imputing missing data for enhanced intersection flow of connected autonomous vehicles","authors":"M. Freire ,&nbsp;A. Maia ,&nbsp;G. Figueiredo ,&nbsp;C. Prazeres ,&nbsp;W. Lobato ,&nbsp;L. Villas ,&nbsp;C. Sommer ,&nbsp;M. Peixoto","doi":"10.1016/j.jnca.2025.104233","DOIUrl":"10.1016/j.jnca.2025.104233","url":null,"abstract":"<div><div>Urban intersection management affects traffic safety and flow. Particularly with the increasing presence of Connected Autonomous Vehicle (CAV), pedestrians, and cyclists, inefficient control can lead to congestion, delays, and an increased risk of accidents. Data communication failures due to physical obstacles, interference, network issues, or faulty sensors can create information gaps that negatively impact management solutions. We present an intersection management system for CAVs that relies on continuous data communication between vehicles and infrastructure. The system performs conflict analysis to identify potential collisions while dynamically adjusting vehicle speeds. To address missing information, we incorporate data imputation usingPiecewise Cubic Hermite Interpolating Polynomial (PCHIP), a method for smooth time series interpolation method. Simulation results demonstrate that Dynamic Adaptive Intersection Control System (DAICS) sustains high performance under data loss scenarios, reducing average travel time by 68.4% compared to the baseline algorithm, Intersection Management for Autonomous Vehicles (IMAV).</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104233"},"PeriodicalIF":7.7,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144271431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized certificate issuance and verification system using Ethereum blockchain technology 使用以太坊区块链技术的分散式证书颁发和验证系统
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-10 DOI: 10.1016/j.jnca.2025.104190
Sam Prince Franklin S., Mary Shamala L., Thankaraja Raja Sree
{"title":"Decentralized certificate issuance and verification system using Ethereum blockchain technology","authors":"Sam Prince Franklin S.,&nbsp;Mary Shamala L.,&nbsp;Thankaraja Raja Sree","doi":"10.1016/j.jnca.2025.104190","DOIUrl":"10.1016/j.jnca.2025.104190","url":null,"abstract":"<div><div>The increasing prevalence of fraudulent and inefficient centralized certificate systems poses significant challenges across various sectors, undermining trust and hindering efficient verification processes. This paper aims to overcome these difficulties by offering a decentralized certificate issuance and verification system based on Ethereum blockchain technology and Goerli testnet. It is developed to provide a reliable and transparent way to create and validate credentials in various industries (for example, education—offering a transparent and non-tamper proof validation of academic credentials; healthcare—allowing for the secure validation of medical education; government—speeding up the validation of official documents). Our solution then uses the unique features of decentralized blockchain technology to remove the need for a central authority, closing off an entire attack vector of fraud and the misrepresentation of businesses, which opens the door to greater global trust and security when it comes to digital credentials. Certificate information is securely stored within smart contracts on the Ethereum blockchain, enabling automated verification processes for enhanced efficiency. Tested on the Goerli testnet and incorporating a user-friendly mobile application, our approach offers a robust and scalable solution for certificate management, promising to revolutionize credentialing processes across diverse applications and ensure enhanced security and trustworthiness for future digital ecosystems.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104190"},"PeriodicalIF":7.7,"publicationDate":"2025-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144263320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PMMJC: A preference-based multi-stage matching-mechanism for JointCloud environments PMMJC:用于JointCloud环境的基于首选项的多阶段匹配机制
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-09 DOI: 10.1016/j.jnca.2025.104221
Hao Lu , Jianzhi Shi , Yang Song , Xingwei Wang , Bo Yi , Pengbo Li , Yudi Cheng , Min Huang , Sajal K. Das
{"title":"PMMJC: A preference-based multi-stage matching-mechanism for JointCloud environments","authors":"Hao Lu ,&nbsp;Jianzhi Shi ,&nbsp;Yang Song ,&nbsp;Xingwei Wang ,&nbsp;Bo Yi ,&nbsp;Pengbo Li ,&nbsp;Yudi Cheng ,&nbsp;Min Huang ,&nbsp;Sajal K. Das","doi":"10.1016/j.jnca.2025.104221","DOIUrl":"10.1016/j.jnca.2025.104221","url":null,"abstract":"<div><div>With the rise of data-intensive applications, the demand for cloud services has increased significantly, driving the emergence of JointCloud, a novel cloud 2.0 architecture. JointCloud facilitates collaboration among Cloud Service Providers (CSPs) to meet global computational demands. However, as consumer needs become increasingly diversified, the challenge of service matching has grown more complex, particularly in balancing user preferences with CSP resource attributes, such as reputation and data relevance. To address this challenge, this paper proposes a preference-based multi-stage matching mechanism (PMMJC). This mechanism integrates user preferences, CSP reputation, data relevance, risk factors, and Quality of Service (QoS) metrics, employing multi-dimensional optimization methods for service matching. First, a rule-based filtering method is used to quickly eliminate CSPs that do not meet basic resource requirements, narrowing the search space. Next, Uniform Manifold Approximation and Projection (UMAP) dimensionality reduction and the Maximal Information Coefficient estimator (MICe) are combined to assess data relevance and optimize computational efficiency. Then, a coverage decision-making method is applied to derive the Pareto optimal solution set, ensuring balanced performance across multiple dimensions for candidate CSPs. Finally, weighted methods and entropy-weighted fuzzy comprehensive evaluation are used to dynamically adapt to user preferences and generate personalized matching results. Experimental results demonstrate that compared to benchmark methods such as AHP-IOWA and Fuzzy-ETDBA, PMMJC excels in matching efficiency, data relevance accuracy, multi-objective balance, and user satisfaction, significantly enhancing service matching quality in the JointCloud environment.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104221"},"PeriodicalIF":7.7,"publicationDate":"2025-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144263218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROM: A persistent routing optimization method based on supervised learning 基于监督学习的持久路由优化方法
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-08 DOI: 10.1016/j.jnca.2025.104223
Yingya Guo, Zebo Huang, Mingjie Ding, Bin Lin, Huan Luo
{"title":"PROM: A persistent routing optimization method based on supervised learning","authors":"Yingya Guo,&nbsp;Zebo Huang,&nbsp;Mingjie Ding,&nbsp;Bin Lin,&nbsp;Huan Luo","doi":"10.1016/j.jnca.2025.104223","DOIUrl":"10.1016/j.jnca.2025.104223","url":null,"abstract":"<div><div>Traditional Traffic Engineering (TE) typically improves network performance by formulating and solving routing optimization problems based on measured or predicted Traffic Matrices (TMs). However, since network traffic is dynamic, routing strategies optimized for the current measured TMs may not be suitable for future traffic patterns. To adapt to dynamic traffic, one possible solution is to perform more frequent routing updates, but this may lead to service disruptions. Another approach is the two-step method of prediction followed by optimization, which could lead to degraded performance of routing strategies due to inaccuracies in traffic prediction. Additionally, existing approaches focus solely on either distributed or centralized networks, lacking flexibility to adapt to different network architectures. To address these challenges, we propose PROM, a Machine Learning (ML)-based routing optimization model that directly predicts an effective routing strategy in an end-to-end manner based on historical traffic. This routing strategy is applicable across multiple future TMs, thereby reducing the need for frequent routing updates. Furthermore, PROM can be easily extended from a centralized implementation to a distributed one, adapting to different network architectures. To enhance model performance, we have also designed a custom loss function for routing optimization scenarios to avoid overfitting. Extensive simulation results demonstrate that PROM can predict high-quality routing strategies in future unknown traffic scenarios and is adaptable to both centralized and distributed network architectures.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104223"},"PeriodicalIF":7.7,"publicationDate":"2025-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144290510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPSketch: A ‘couple’ sketch-based heavy flow detection method CPSketch:一种基于“一对”草图的大流量检测方法
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-06 DOI: 10.1016/j.jnca.2025.104245
Renpin Yao , Yang Cao , Yunhe Cui , Yi Chen , Chun Guo , Guowei Shen
{"title":"CPSketch: A ‘couple’ sketch-based heavy flow detection method","authors":"Renpin Yao ,&nbsp;Yang Cao ,&nbsp;Yunhe Cui ,&nbsp;Yi Chen ,&nbsp;Chun Guo ,&nbsp;Guowei Shen","doi":"10.1016/j.jnca.2025.104245","DOIUrl":"10.1016/j.jnca.2025.104245","url":null,"abstract":"<div><div>One of the core challenges in network measurement for large-scale networks is the accurate and efficient identification of heavy flows. This task has grown increasingly complex due to limited memory resources and the dynamic nature of network traffic patterns. Most current heavy flow detection methods fail to fully consider the mutual collisions between large flows and their sparse distribution, which are caused by the combined effects of hash collisions and the heavy-tailed distribution of network traffic, resulting in an inefficient use of limited memory resources. Additionally, existing approaches uniformly treat all flows. As a result, when the network contains many small flows, heavy flows are frequently and erroneously replaced. To address these issues, we propose CPSketch, a novel method that combines sketch with ‘couple’ buckets to enhance heavy flow detection accuracy. CPSketch optimizes memory utilization by leveraging cold buckets to store more heavy flows. Specifically, it accurately estimates flow sizes by monitoring the number of matched packets for candidate flows in real-time. For small flows, CPSketch rapidly identifies and evicts them based on flow ratios. For other flows, CPSketch calculates replacement probabilities using multidimensional statistical information. To protect heavy flows that have been incorrectly evicted, CPSketch employs a global hash function to provide additional storage opportunities and dynamically constructs couple buckets for these heavy flows. Moreover, CPSketch extends the selection range for minimum flows by leveraging couple buckets in the flow replacement policy, effectively mitigating the impact of hash limitations and improving memory efficiency. Experimental results from trace-driven simulations and Open vSwitch (OVS) tests demonstrate that CPSketch outperforms existing methods in accuracy, even under constrained memory and high traffic loads. It achieves improvements of up to 14.74 % in F1-score while reducing the Average Relative Error (ARE) by 41.72 % and the Average Absolute Error (AAE) by 42.18 %.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104245"},"PeriodicalIF":7.7,"publicationDate":"2025-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A runtime admission control for industrial IoT over bluetooth low energy mesh networks 基于蓝牙低功耗网状网络的工业物联网运行时准入控制
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-06 DOI: 10.1016/j.jnca.2025.104232
Luca Leonardi, Lucia Lo Bello, Gaetano Patti
{"title":"A runtime admission control for industrial IoT over bluetooth low energy mesh networks","authors":"Luca Leonardi,&nbsp;Lucia Lo Bello,&nbsp;Gaetano Patti","doi":"10.1016/j.jnca.2025.104232","DOIUrl":"10.1016/j.jnca.2025.104232","url":null,"abstract":"<div><div>Bluetooth Low Energy (BLE) is widely used in several industrial IoT applications to save on costs and power consumption. In this context, to widen the coverage area while meeting the constraints of real-time messages, some applications require multi-hop communications with bounded delays. A few approaches in the literature support real-time traffic on BLE mesh networks, but they use offline configurations, which offer a limited flexibility when new connections are dynamically added based on the application requirements. This paper, instead, proposes a Runtime Connection Admission Control for BLE (RAC-BLE) that allows the BLE devices to accept at runtime new connection requests, provided that the relevant transmissions do not overlap with communications from other BLE devices. This way, RAC-BLE by design provides bounded delays on single-hop transmissions, thus enabling BLE-based real-time mesh networks. The paper provides a detailed description of the RAC-BLE approach, an analytical calculation of the worst case end-to-end delays and experimental performance evaluations. The results show that RAC-BLE significantly reduces the maximum end-to-end delays compared with those obtained by another approach in the literature. For instance, a delay reduction of 70% and 92% is measured in the case of one hop and five hops, respectively.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104232"},"PeriodicalIF":7.7,"publicationDate":"2025-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144241156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time tracking railway intruders using multiple-agent cooperated large language models with edge stream processing engine 基于边缘流处理引擎的多智能体协同大语言模型实时跟踪铁路入侵者
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-04 DOI: 10.1016/j.jnca.2025.104231
Wei Huang, Xiaoyun Deng
{"title":"Real-time tracking railway intruders using multiple-agent cooperated large language models with edge stream processing engine","authors":"Wei Huang,&nbsp;Xiaoyun Deng","doi":"10.1016/j.jnca.2025.104231","DOIUrl":"10.1016/j.jnca.2025.104231","url":null,"abstract":"<div><div>Tracking intruders is crucial for ensuring safe railway operations globally, particularly in high-speed railway systems. Traditional methods either rely on post-processing on cloud platforms or suffer from limited analytical capabilities on edge devices. Although large language models (LLMs) have shown great potential to support general intelligence, challenges remain for edge devices in accurately and timely tracking of intruders along railway lines. This study proposes a novel method that combines a multi-agent cooperative framework (MetaGPT) with an edge stream processing engine (GeoEkuiper). Unlike most methods, this study adopts an agent-cooperative spatial data analysis approach employing a debate-and-vote strategy. Specifically, GeoEkuiper is responsible for processing high-speed and large volume of geospatial data streams regarding location history and object characteristics, while the modified MetaGPT framework facilitates information sharing and decision-making between agents that use LLMs. By enabling each edge device to engage in a debate about the presence of detected targets within their monitoring areas, the system utilizes a simple voting agent to determine which devices are most likely to observe the target. Considering the resource limitations of edge devices, we fine-tuned small yet powerful LLMs to direct GeoEkuiper to iteratively compute spatial affinity relationships using Structured Query Language (SQL) statements, which facilitate human-edge interaction. Based on tests conducted on resource-constrained edge devices such as Raspberry Pi devices interconnected in an unstable networking environment, we found that this approach significantly enhances the accuracy and responsiveness of intruder tracking in real-time scenarios, providing a robust solution for railway security applications.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104231"},"PeriodicalIF":7.7,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144223256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large-scale web tracking and cookie compliance: Evaluating one million websites under GDPR with AI categorization 大规模网络跟踪和cookie合规性:用AI分类评估GDPR下的100万个网站
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-04 DOI: 10.1016/j.jnca.2025.104222
David Martínez , Aniol Molero , Eusebi Calle , Dolors Canals Ametller , Albert Jové
{"title":"Large-scale web tracking and cookie compliance: Evaluating one million websites under GDPR with AI categorization","authors":"David Martínez ,&nbsp;Aniol Molero ,&nbsp;Eusebi Calle ,&nbsp;Dolors Canals Ametller ,&nbsp;Albert Jové","doi":"10.1016/j.jnca.2025.104222","DOIUrl":"10.1016/j.jnca.2025.104222","url":null,"abstract":"<div><div>With the increasing prevalence of web-tracking technologies, including tracking cookies, pixel tracking, and browser fingerprinting techniques, there is a pressing need to analyze their impact on user privacy. Despite the growing interest in the scholarly literature, large-scale, fully automatic evaluations of website compliance with privacy regulations remain scarce. In this paper, we present new algorithms, methods, and an AI categorization model designed for massive, fully automatic analyses of web-tracking and cookie compliance and usage with and without valid user consent. Utilizing the recently published Website Evidence Collector (WEC) software from the European Data Protection Supervisor (EDPS), these algorithms are applied to assess over one million websites from Tranco’s top list under European GDPR regulation. A novel 22-category multilabel AI model for website categorization provides content-based context to compliance results, achieving 96.56% accuracy and an F1 score of 0.963. Results reveal that nearly half of the websites utilize tracking cookies, while over half employ pixel tracking without user consent, thus highlighting significant differences between websites’ content categories. Additionally, our analysis demonstrates how web-tracking power is concentrated among just a few companies, with the top 10 tracking firms being responsible for most compliance violations related to obtaining valid user consent. This paper serves as a foundation for ongoing large-scale web-tracking analyses, essential for understanding trends over time and evaluating the effectiveness of privacy regulations.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104222"},"PeriodicalIF":7.7,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144254903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAKA: Scalable authentication and key agreement scheme with configurable key evolution in edge-fog-multicloud computing environments SAKA:在边缘雾多云计算环境中具有可配置密钥演进的可扩展身份验证和密钥协议方案
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2025-06-04 DOI: 10.1016/j.jnca.2025.104220
Guiliang Chen, Jie Huang, Jiazhou Zeng, Yu Zhou
{"title":"SAKA: Scalable authentication and key agreement scheme with configurable key evolution in edge-fog-multicloud computing environments","authors":"Guiliang Chen,&nbsp;Jie Huang,&nbsp;Jiazhou Zeng,&nbsp;Yu Zhou","doi":"10.1016/j.jnca.2025.104220","DOIUrl":"10.1016/j.jnca.2025.104220","url":null,"abstract":"<div><div>Fog computing can efficiently address problems in centralized cloud computing in multi-cloud environments, such as network congestion, data loss, high latency, and excessive energy consumption. However, it poses additional challenges to authentication and key agreement schemes, especially regarding scalability, overhead, and security. To address these challenges, this paper proposes a scalable authentication and key agreement (SAKA) scheme with configurable key evolution tailored for fog computing in multi-cloud environments. The proposed SAKA scheme integrates a configurable key evolution mechanism with a sound synchronization feature and introduces timing constraints to address concurrency-induced key synchronization issues in multi-cloud environments. This approach allows for tailoring the adjustable key renewal period to specific application needs, thus balancing security and overhead. In addition, the SAKA scheme uses the elliptic curve Diffie–Hellman key exchange method with a pre-shared key to establish session keys between fog gateways and cloud applications. This approach eliminates the need for resource-intensive certificates and ensures perfect forward secrecy. Further, implementing the broadcast mechanism in the proposed SAKA scheme reduces computational and communication overhead in multi-cloud environments, thus enhancing scalability. The results of a comprehensive security analysis conducted using both formal and informal methods prove that the proposed SAKA scheme is secure. Finally, a comparison with existing schemes demonstrates that the SAKA scheme excels in security authentication for fog gateways in multi-cloud environments. The proposed SAKA scheme reduces computational overhead by 50% for single-entity authentication and by up to 67% for multi-entity scenarios.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"242 ","pages":"Article 104220"},"PeriodicalIF":7.7,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144254902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信