{"title":"A scalable blockchain framework for IoT based on restaking and incentive mechanisms","authors":"Fang Ye , Zitao Zhou , Yifan Wang , Yibing Li","doi":"10.1016/j.comcom.2025.108317","DOIUrl":"10.1016/j.comcom.2025.108317","url":null,"abstract":"<div><div>This paper proposes a scalable blockchain framework based on sidechain solution for the Internet of Things (IoT). Considering the low-trust models of existing sidechains, we present a restaking-based trust aggregation method for Proof of Stake (PoS). By allowing mainchain validators to duplicate their stake on the sidechain network, we enhance the cryptoeconomics security of the sidechain while reducing costs. Given the potential conflicts between risks and rewards of trust aggregation, and the challenges posed by the heterogeneity of IoT devices for quantitative analysis, we propose an incentive analysis framework based on contract. By analyzing the optimal strategies of different risk-preference validators, design differentiated contracts to promote incentive-compatible outcomes. Additionally, we account for the uncertainty in the distribution of sidechain validators and discuss optimal configurations under various conditions. To address potential collusion attacks, we introduce a quantifiable exemption mechanism to limit the security risks. Finally, numerical simulations verify the feasibility and effectiveness of our proposed method.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108317"},"PeriodicalIF":4.3,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145095339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tensor-based task allocation using multi-objective optimization in GECC environment","authors":"Huazhong Liu, Longtao Huang, Yuan Tian, Jihong Ding, Xiaoxue Yin, Guangshun Zhang","doi":"10.1016/j.comcom.2025.108316","DOIUrl":"10.1016/j.comcom.2025.108316","url":null,"abstract":"<div><div>Green Edge-Cloud Computing (GECC) has emerged as a promising paradigm to meet the diverse requirements of modern applications by integrating edge and cloud resources. Existing task allocation strategies in GECC environment often fail to adequately address the problems of low resource utilization and high economic cost in multi-objective conflicts. Therefore, this paper proposes a tensor-based task allocation scheme using multi-objective optimization in GECC environment. We first extend the task allocation problem in GECC environment to a multi-objective optimization problem and construct five optimization models, i.e., energy, system reliability, quality of experience, economic cost, and latency. Then, to address the complex relationship among these objectives, we develop a tensor-based representation and calculation model for task allocation across cloud, edge service, and edge device platforms. Furthermore, we propose a tensor-based multi-objective beetle swarm optimization algorithm combined speed limiting and dynamic step strategies (TMOBSO-SLDS) that dynamically adjusts the step size and limit speed to improve the global search efficiency and the diversity of solution set. Extensive experimental results in various task allocation scenarios demonstrate that our proposed TMOBSO-SLDS algorithm outperforms existing approaches, as measured by the HV value. It can significantly enhance the diversity of the solution set and improve resource utilization.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"243 ","pages":"Article 108316"},"PeriodicalIF":4.3,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145160253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive retention-aware online video caching scheme in mobile edge computing","authors":"Guangzhou Liu, Zhen Qian, Guanghui Li","doi":"10.1016/j.comcom.2025.108313","DOIUrl":"10.1016/j.comcom.2025.108313","url":null,"abstract":"<div><div>The current massive video requests have caused severe network congestion. To reduce transmission latency and improve user Quality of Experience (QoE), caching infrastructures are deployed closer to the edge. Nowadays, most caching systems tend to cache content with a high programming voltage to ensure a long retention time, which leads to significant cache damage. However, as new videos emerge every second, the rapidly changing popularity makes long retention time wasteful in terms of caching resource. Moreover, with the rise of emerging video formats (such as virtual reality content), the diverse requirements for transmission latency across various video categories make balancing user QoE more challenging. To tackle these challenges, we propose a joint optimization framework that balances user QoE and operational costs through video category recognition and adaptive retention time selection. First, we model user QoE as transmission latency cost and further formulate the optimization problem as a Markov Decision Process (MDP) to minimize the system cost. To solve the proposed problem, we design a two-step Double Deep Q-Network (DDQN)-based scheme. The scheme first determines the optimal retention time through unifying the process of action selection and state-value evaluation. Secondly, it makes replacement decisions according to the computed caching value of each content. By validating on three datasets, the experiments show that the proposed scheme outperforms the baseline algorithms in both cache hit rate and system cost.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108313"},"PeriodicalIF":4.3,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145048605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-Defined Network: A panoramic P2P framework for distributed ledger systems","authors":"Taehoon Yoo , Kiseok Kim , Hwangnam Kim","doi":"10.1016/j.comcom.2025.108311","DOIUrl":"10.1016/j.comcom.2025.108311","url":null,"abstract":"<div><div>Blockchain technology has revolutionized distributed ledger systems by offering superior security and transparency compared to traditional centralized systems. Despite its advantages, current blockchain systems face significant challenges such as network congestion, communication errors, and scalability issues, largely due to the limitations of blockchain peer-to-peer (P2P) protocols. These problems hinder the performance, reliability, and widespread adoption of blockchain technology. In this paper, we propose a Trust-Defined Network (TDN) framework designed to solve these challenges by reflecting the physical network information to the blockchain. This approach enables the precise diagnosis of existing blockchain P2P protocol limitations and facilitates the objective verification of new improvement measures. Our proposed framework supports various blockchain network environments, particularly Ethereum-based networks, and ensures enhanced network stability and performance. Through extensive simulations and real-world case studies in IoT-enabled blockchain applications, we demonstrate that TDN significantly reduces network congestion, improves transaction finality, and enhances the reliability of blockchain communication channels. These findings highlight the framework’s potential to optimize blockchain infrastructure, making it more robust for large-scale deployment and real-world applications.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108311"},"PeriodicalIF":4.3,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145048604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heiko Bornholdt , Kevin Röbert , Stefan Schulte , Janick Edinger , Mathias Fischer
{"title":"Simplifying distributed application deployment at the edge through software-defined overlay networks","authors":"Heiko Bornholdt , Kevin Röbert , Stefan Schulte , Janick Edinger , Mathias Fischer","doi":"10.1016/j.comcom.2025.108294","DOIUrl":"10.1016/j.comcom.2025.108294","url":null,"abstract":"<div><div>The need for low latency, bandwidth efficiency, and privacy has driven the deployment of distributed applications to the network edge. However, edge environments introduce concrete challenges such as limited infrastructure control, constrained connectivity due to NAT or firewalls, and the heterogeneity of devices and network conditions. This paper introduces a software-defined overlay networking (SDON) middleware that addresses these issues by simplifying the development and deployment of edge applications through centralized control and dynamic overlay management. SDON allows applications to define high-level requirements, such as node and link characteristics and the network topology. These requirements are translated into device-specific configurations and enforced across suitable edge devices. We implemented our SDON middleware as a fully functional software and evaluated it in two edge computing use cases: i) routing for video streaming across middleboxed edge devices and ii) computation offloading on heterogeneous edge devices. Our results show that deployments via SDON, with centrally enforced optimizations, improve application performance by reducing mean streaming latency by 20<!--> <!-->% and computation times by 22<!--> <!-->%.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108294"},"PeriodicalIF":4.3,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144931527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Graziano Rizzo , Mattia Giovanni Spina , Floriano De Rango
{"title":"Distributed Denial of Service attack analysis and mitigation for MQTTv5 shared subscription","authors":"Graziano Rizzo , Mattia Giovanni Spina , Floriano De Rango","doi":"10.1016/j.comcom.2025.108298","DOIUrl":"10.1016/j.comcom.2025.108298","url":null,"abstract":"<div><div>Sixth-generation (6G) networks will feature Massive IoT (M-IoT) deployments with a huge number of interconnected devices, enabling fast and reliable IoT applications. To address scalability and enhance message delivery, MQTTv5 introduces the <em>shared subscription</em> mechanism. However, the increased interconnectivity amplifies security vulnerabilities, posing significant risks with potentially severe consequences. In light of these challenges, this work aims to conduct a security-focused analysis of the shared subscription feature. Our study highlights the potential extent of damage from such an attack, which can potentially lead to indefinite <em>starvation</em> among legacy subscribers, and proposes a countermeasure to mitigate its impact. Additionally, to provide comprehensive security to the proposed mitigation mechanism, we design an Authenticated Encryption with Associated Data (AEAD)-based protection to counteract <em>external</em> malicious entities as well as an attacker detection mechanism based on a trust-based approach combined with the <em>z-score</em> statistical method to protect the proposed mitigation against <em>internal</em> attackers. These countermeasures are designed to accommodate the lightweight nature of MQTT and are characterized by a low protocol footprint while effectively mitigating the impact of the attack. Through an extensive experimental campaign, we tested this solution under real IoT traffic patterns to demonstrate its effectiveness and capability to restore the performance of the MQTT system targeted by the discovered attack.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108298"},"PeriodicalIF":4.3,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating blockchain with IoT: Evaluating the feasibility of lightweight Bitcoin wallets on resource-constrained devices","authors":"Mohsen Rahmanikivi , Cristina Pérez-Solà , Víctor Garcia-Font","doi":"10.1016/j.comcom.2025.108300","DOIUrl":"10.1016/j.comcom.2025.108300","url":null,"abstract":"<div><div>The integration of blockchain technology with IoT architectures holds immense potential for advancing application design and enhancing security properties. However, the resource constraints typically present in IoT devices pose a challenge. This paper explores the feasibility of running a lightweight Bitcoin wallet on IoT devices and identifies the minimum requirements for their successful operation. A review of the literature is used to identify existing integration architectures and derive the wallet needs. The study evaluates performance metrics such as execution time, memory usage, network data transmission, and power consumption to determine the feasibility of deploying these architectures.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108300"},"PeriodicalIF":4.3,"publicationDate":"2025-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144895310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lingfeng Wu , Rui Zhu , Yarong Chen , Peng Chu , Juan Tian , Jiuxiao Cao
{"title":"Research on grouping strategy for NOMA downlink based on Pointer Network","authors":"Lingfeng Wu , Rui Zhu , Yarong Chen , Peng Chu , Juan Tian , Jiuxiao Cao","doi":"10.1016/j.comcom.2025.108296","DOIUrl":"10.1016/j.comcom.2025.108296","url":null,"abstract":"<div><div>With the application of Non-Orthogonal Multiple Access (NOMA) technology in 5G and beyond communication systems, how to effectively group users to optimize power allocation has become a key challenge. This paper proposes a user grouping method based on a Pointer Network, which efficiently extracts user location information through embedding layers, encoder–decoder structures, and attention mechanisms, achieving the goal of precise grouping decisions and power optimization. The embedding layer maps users’ two-dimensional coordinates into a high-dimensional space, enhancing the model’s spatial awareness. The encoder–decoder structure, combined with Long Short-Term Memory (LSTM) networks and attention mechanisms, captures the spatiotemporal dependencies between users and dynamically selects the optimal path during the grouping process. Experimental results show that when users are located 300 meters from the base station, the recognition accuracy of a 4-user grouping reaches 94.85%, and that of a 6-user grouping reaches 89.3%. The method also demonstrates strong robustness under multipath fading channels and low signal-to-noise ratio conditions. Compared to random grouping methods, the proposed grouping strategy exhibits better adaptability and scalability in complex communication environments, significantly reducing power consumption, and providing new technical support for resource allocation and energy management in NOMA systems.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108296"},"PeriodicalIF":4.3,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144889388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenlin Cheng , Xingwei Wang , Fuliang Li , Bo Yi , Qiang He , Chuangchuang Zhang , Chengxi Gao , Min Huang
{"title":"Distributed learning-based context-aware SFC deployment in the Artificial Intelligence of Things","authors":"Wenlin Cheng , Xingwei Wang , Fuliang Li , Bo Yi , Qiang He , Chuangchuang Zhang , Chengxi Gao , Min Huang","doi":"10.1016/j.comcom.2025.108309","DOIUrl":"10.1016/j.comcom.2025.108309","url":null,"abstract":"<div><div>With the rapid development of the Internet of Things (IoT) and Artificial Intelligence (AI) technologies, the Artificial Intelligence of Things (AIoT) has become a key driving force for realizing intelligent and automated applications. The deployment of Service Function Chains (SFCs) is crucial in dynamic AIoT environments, where efficiently and flexibly deploying SFCs to meet real-time application demands is a research focus. However, existing SFC deployment methods often face challenges such as dynamic variations and uncertainty in contextual information, resource allocation inefficiencies, and limited adaptability to changing network conditions. To address these issues, we propose a learning-based context-aware dynamic SFC deployment method tailored for AIoT environments. Specifically, we introduce an attention-based contextual feature extraction method to capture dynamic changes (e.g., link latency variations) and prioritize key contextual information, improving the rate of served requests by 17.90% (69.60% vs. 59.03% for MADDPG) and enhancing the flexibility of SFC deployment decisions. Additionally, to address resource allocation bottlenecks and adaptability challenges in SFC deployment, we propose a distributed learning-based context-aware approach that uses collaborative learning and periodic updates (every 200 ms) to adjust SFC deployment strategies in response to topology changes and load variations and optimize system performance. Extensive experimental results demonstrate the efficacy of the proposed algorithm. Numerical results demonstrate that our algorithm reduces SFC deployment latency by 8% (46 ms vs. 50 ms for MADDPG), achieves 98.3% computational resource utilization, processes 211 Mbit/s service data volume, and improves adaptability to network changes, as validated in simulations.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108309"},"PeriodicalIF":4.3,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144903203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dimitrios Zorbas, Sultan Kasenov, Kamila Salimzhanova, Dias Gaziz, Timur Ismailov, Batyrkhan Baimukhanov
{"title":"Applying reinforcement learning in slotted LoRaWAN: From concept to implementation","authors":"Dimitrios Zorbas, Sultan Kasenov, Kamila Salimzhanova, Dias Gaziz, Timur Ismailov, Batyrkhan Baimukhanov","doi":"10.1016/j.comcom.2025.108297","DOIUrl":"10.1016/j.comcom.2025.108297","url":null,"abstract":"<div><div>As Low Power Wide Area Networks (LPWANs) are increasingly adopted for Internet of Things (IoT) applications, they face significant challenges related to interference and scalability, which can lead to high collision rates and reduced network throughput. This paper presents a novel approach to enhancing the performance of LoRaWAN, one of the dominant LPWAN protocols, by leveraging Reinforcement Learning (RL). The proposed solution introduces a synchronization framework designed to operate under LoRaWAN principles, coupled with a low-cost, on-device RL mechanism that autonomously mitigates collisions. Through extensive simulations and real-world experiments, the effectiveness of the RL approach is demonstrated, showing an over 30% improvement in terms of packet delivery ratio (PDR) compared to traditional multiple access methods such as Pure-Aloha, Slotted-Aloha, and Carrier Sense Multiple Access (CSMA). Additionally, open-source implementations for both simulation and experimental validation are provided, ensuring reproducibility and facilitating further research in this domain.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108297"},"PeriodicalIF":4.3,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144863897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}