Ad Hoc Networks最新文献

筛选
英文 中文
Integrated network-computing resource allocation and optimized scheduling for cyber physical production system 网络物理生产系统的综合网络计算资源分配与优化调度
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-20 DOI: 10.1016/j.adhoc.2025.103831
Xiaoqian Yu , Changqing Xia , Xi Jin , Chi Xu , Dong Li , Peng Zeng
{"title":"Integrated network-computing resource allocation and optimized scheduling for cyber physical production system","authors":"Xiaoqian Yu ,&nbsp;Changqing Xia ,&nbsp;Xi Jin ,&nbsp;Chi Xu ,&nbsp;Dong Li ,&nbsp;Peng Zeng","doi":"10.1016/j.adhoc.2025.103831","DOIUrl":"10.1016/j.adhoc.2025.103831","url":null,"abstract":"<div><div>Edge computing plays a crucial role in cyber physical production system (CPPS) by connecting the cloud, thereby enhancing system flexibility, intelligence, and agility. However, current scholarly work predominantly focuses on the tight binding of tasks and platforms to meet the real-time and deterministic requirements of CPPS, but does not fully utilize the flexibility and customization characteristics of CPPS. Therefore, there is an urgent need for intelligent and flexible task platform decoupling in the future to meet various quality of service (QoS) requirements such as flexibility, energy consumption and real-time performance, which also brings the challenge of meeting CPPS requirements. To address this issue, this work studies the decoupled flexible manufacturing dynamical scheduling problem with the aim of jointly optimizing real-time performance and energy consumption. Firstly, a multi-priority feedback queue is designed, which can dynamic adjust priority to ensure real-time performance of tasks. Subsequently, multi-objective optimization models are used to allocate network and computing resources for tasks, taking system latency and energy consumption into account as costs. To narrow the solution space and improve solving speed, a locally optimal resource allocation method is derived. Furthermore, scheduling algorithms for the end-side and edge-side are designed separately. On one hand, considering the energy sensitivity of edge devices, a lightweight scheduling algorithm called terminal double deep Q network (T-DDQN) has been proposed to quickly determine the optimal task execution location. On the other hand, a task offloading strategy named game theory edge device-level task offloading (GTETO) has been introduced to address the load imbalance issues at the edge caused by T-DDQN. Compared to existing algorithms, it can reduce system cost by up to 25.26%, and improve resource utilization of edge devices by 8.34–27.77%.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103831"},"PeriodicalIF":4.4,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-based Intelligent Vehicular Network: Blockchain perspective 基于无人机的智能车联网:区块链视角
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-20 DOI: 10.1016/j.adhoc.2025.103827
Tariq Ahamed Ahanger , Usman Tariq , Imdad Ullah
{"title":"UAV-based Intelligent Vehicular Network: Blockchain perspective","authors":"Tariq Ahamed Ahanger ,&nbsp;Usman Tariq ,&nbsp;Imdad Ullah","doi":"10.1016/j.adhoc.2025.103827","DOIUrl":"10.1016/j.adhoc.2025.103827","url":null,"abstract":"<div><div>The increasing number of cars worldwide has resulted in significant problems such as fatalities, pollution, and traffic congestion. Developing a smart automotive system that promotes safe driving is a viable solution. However, the current vehicle system faces challenges such as data dependability, security, and ease of deployment. The current study proposes an intelligent vehicular system that is safe, deployable, and of high quality enabled by Unmanned Aerial Vehicle (UAVs). Specifically, the use of UAVs in the communication sector makes the networks vulnerable to cyber-attacks, which can cause significant damage to the industry. Henceforth, a blockchain-assisted registering and verifying mechanism is proposed for UAVs, smart vehicles, and roadside units. The presented research focuses on the blockchain-inspired security technique and the optimized positioning of UAVs to enhance the network’s spectral efficacy. The study considers various communication-related criteria such as available bandwidth, the maximum number of connections a UAV can handle, and constraints when linking remote units to UAVs. The presented technique can be effectively incorporated into the existing vehicular network to provide secure and reliable communications. The performance of the presented technique is validated in experimental simulation in which enhanced results have been registered for statistical parameters.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103827"},"PeriodicalIF":4.4,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid and self-adaptive QoS and QoE-driven RAT selection strategy for IoT devices 物联网设备的混合自适应QoS和QoS驱动RAT选择策略
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-18 DOI: 10.1016/j.adhoc.2025.103838
Tassadit Sadoun , Sarah Oubabas , Sabrina Mokrani , Rachida Aoudjit , Jaime Lloret
{"title":"A hybrid and self-adaptive QoS and QoE-driven RAT selection strategy for IoT devices","authors":"Tassadit Sadoun ,&nbsp;Sarah Oubabas ,&nbsp;Sabrina Mokrani ,&nbsp;Rachida Aoudjit ,&nbsp;Jaime Lloret","doi":"10.1016/j.adhoc.2025.103838","DOIUrl":"10.1016/j.adhoc.2025.103838","url":null,"abstract":"<div><div>In recent years, the Internet of Things (IoT) has witnessed an explosion, which enables new applications based on connecting numerous devices to the Internet. However, the increasing number of IoT devices utilizing various Radio Access Technologies (RATs), each with distinct communication requirements, presents significant challenges in ensuring reliable Quality of Service (QoS) in such a heterogeneous, multi-technology, multi-user, and multi-application environment. Therefore, for a proper RAT selection, this paper proposes a novel hybrid and adaptive approach based on Deep Reinforcement Learning (DRL) that combines QoS and Quality of Experience (QoE) factors. Unlike previous research, our approach integrates QoS parameters and an adaptive network trust factor that reflects the user's QoE based on reliable past device experiences, ultimately providing users with consistently better connectivity. Within our framework, an IoT device dynamically selects its RAT in a distributed manner based on service requirements and the trust score it assigns to RATs, reflecting its satisfaction with past RAT behavior. The proposed hybrid and adaptive RAT selection approach meets QoS requirements, for various applications at any time as indicated by simulations run using Network Simulator 3 (NS3). Compared to other methods, the energy consumption was reduced by 64.12%, network handovers were decreased by 37.73%, while the average packet delivery ratio was improved by 17.85%. This demonstrates the effectiveness of the proposed approach in optimizing both energy efficiency and network performance, ensuring a more reliable and sustainable system for IoT applications.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"174 ","pages":"Article 103838"},"PeriodicalIF":4.4,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICMH-CHR: An intra-cluster multi-hop based cluster head rotation protocol for wireless sensor networks ICMH-CHR:无线传感器网络中基于簇内多跳的簇头旋转协议
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-17 DOI: 10.1016/j.adhoc.2025.103829
Weibing Zeng , Zhendong Wang , Shuxin Yang , Daojing He , Sammy Chan
{"title":"ICMH-CHR: An intra-cluster multi-hop based cluster head rotation protocol for wireless sensor networks","authors":"Weibing Zeng ,&nbsp;Zhendong Wang ,&nbsp;Shuxin Yang ,&nbsp;Daojing He ,&nbsp;Sammy Chan","doi":"10.1016/j.adhoc.2025.103829","DOIUrl":"10.1016/j.adhoc.2025.103829","url":null,"abstract":"<div><div>In wireless sensor networks (WSN), clustered routing protocols usually require periodic re-clustering to balance the energy among nodes. Frequent clustering aggravates the energy consumed by the network into clusters and ignores whether the network needs to be re-clustered every round, cluster head (CH) rotation is proposed to counter this problem. In this paper, we propose an intra-cluster multi-hop based CH rotation (ICMH-CHR) protocol for WSN. This protocol sets two thresholds based on the average residual energy in the cluster. These thresholds are used to dynamically regulate the network re-clustering and CH rotation strategies, respectively, to reduce the number of network re-clustering and avoid the premature death of CH nodes. In addition, the intra-cluster multi-hop strategy is used to solve the problem of CHs moving away from the cluster center due to intra-cluster rotation. For inter-cluster communication, the CH selects the most energy-efficient relay node by measuring the distance to other CHs through RSSI. Simulation results show that the proposed ICMH-CHR effectively extends the network lifetime and performs well in load balancing compared to LEACH, EEUC, T-LEACH, EEHCCP, and EAUCA.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103829"},"PeriodicalIF":4.4,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143642154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPSR-CB: A novel routing algorithm for FANET using cross-layer models in combination with multi-level backbone UAV GPSR-CB:一种基于多层级骨干无人机的跨层路由算法
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-15 DOI: 10.1016/j.adhoc.2025.103828
Mai Cuong Tho , Le Huu Binh , Tu T. Vo
{"title":"GPSR-CB: A novel routing algorithm for FANET using cross-layer models in combination with multi-level backbone UAV","authors":"Mai Cuong Tho ,&nbsp;Le Huu Binh ,&nbsp;Tu T. Vo","doi":"10.1016/j.adhoc.2025.103828","DOIUrl":"10.1016/j.adhoc.2025.103828","url":null,"abstract":"<div><div>This paper presents GPSR-CB, a cross-layer approach to enhance the performance of greedy forwarding in the Greedy Perimeter Stateless Routing (GPSR) protocol for flying ad-hoc networks (FANETs) with multi-level backbone unmanned aerial vehicle (UAV). The cross-layer design combines adaptive transmission power control, link quality monitoring to assess and select reliable links, and ACK-based feedback mechanisms to address routing-void challenges in location-based routing. Specifically, GPSR-CB leverages a multi-level backbone UAV to support the greedy forwarding mode, whereas power control, link quality assessment, and ACK-based feedback help mitigate the changes in network topology, unstable links, and unreliable channels, particularly in FANET environments with noise and interference. Through comprehensive simulations conducted using OMNeT++, we demonstrate that GPSR-CB outperforms the compared protocols in terms of packet delivery ratio, network throughput, and power consumption.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103828"},"PeriodicalIF":4.4,"publicationDate":"2025-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143643748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-based Task Scheduling Scheme in Vehicular Fog Computing: Cooperative and mobility aware approach 基于drl的车辆雾计算任务调度方案:协作和机动性感知方法
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-13 DOI: 10.1016/j.adhoc.2025.103819
Mekala Ratna Raju , Sai Krishna Mothku , Manoj Kumar Somesula
{"title":"DRL-based Task Scheduling Scheme in Vehicular Fog Computing: Cooperative and mobility aware approach","authors":"Mekala Ratna Raju ,&nbsp;Sai Krishna Mothku ,&nbsp;Manoj Kumar Somesula","doi":"10.1016/j.adhoc.2025.103819","DOIUrl":"10.1016/j.adhoc.2025.103819","url":null,"abstract":"<div><div>In the realm of Vehicular Fog Computing (VFC), the dynamic nature of vehicular networks presents substantial challenges for effective task scheduling and resource allocation. The rapidly changing mobility patterns of vehicles complicate the management of service delays for vehicular requests and the energy usage of servers. Our research addresses these challenges by focusing on cooperative and mobility-aware task scheduling in VFC, aiming to optimize fog server performance and ensure the timely processing of vehicular tasks. We model vehicle mobility using a Markov renewal process to determine vehicle movements. The task scheduling problem is formulated as a mixed-integer non-linear programming (MINLP) problem, considering constraints such as task deadlines, resource limits, and vehicle mobility. To tackle this problem, we utilize a deep reinforcement learning (DRL) technique, which allows for adaptive and intelligent task scheduling and resource allocation. Through extensive simulations, our approach demonstrates significant improvements over existing benchmark techniques, achieving a 12% reduction in service delays and a 14% decrease in energy consumption.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103819"},"PeriodicalIF":4.4,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143643830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hierarchical DV-Hop localization algorithm based on RSSI with self-localization weighted offset correction 基于自定位加权偏移校正的RSSI分层DV-Hop定位算法
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-12 DOI: 10.1016/j.adhoc.2025.103832
Tao He , Ya-Peng Zhang , Ming-Ze Yan , Wei-Ping Luo , Shuang-Bao Ma
{"title":"A hierarchical DV-Hop localization algorithm based on RSSI with self-localization weighted offset correction","authors":"Tao He ,&nbsp;Ya-Peng Zhang ,&nbsp;Ming-Ze Yan ,&nbsp;Wei-Ping Luo ,&nbsp;Shuang-Bao Ma","doi":"10.1016/j.adhoc.2025.103832","DOIUrl":"10.1016/j.adhoc.2025.103832","url":null,"abstract":"<div><div>The classic DV-Hop (Distance Vector Hop) localization algorithm in wireless sensor networks not only has poor performance in non-regular random topology networks, but also relies heavily on the local network topology for localization accuracy in uniform random topology networks. To address this issue, this paper proposes a hierarchical DV-Hop localization algorithm (H-DV Hop RSIWOC) based on RSSI and self-positioning weighted offset correction. The best error estimation of the whole network is deduced by self-localization of the anchor nodes; the unknown nodes in the whole network are graded and localized level by level, and for the initial localization results, the best estimation error circle and RSSI circle are constructed, and the offset vectors and offset weights are computed, and the weighted offset corrections are applied to the initial localization coordinates. The simulation results indicate that within an identical experimental setting, compared with the classical DV-Hop algorithm and other improved algorithms, H-DV-Hop-RSIWOC possesses higher localization accuracy and stability in non-regular random topological networks, and also shows excellent algorithmic performance in uniform random topological networks.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103832"},"PeriodicalIF":4.4,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous time-based indoor localization systems—Comparative analysis under realistic industrial-oriented conditions 基于异步时间的室内定位系统——现实工业条件下的比较分析
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-11 DOI: 10.1016/j.adhoc.2025.103816
Rubén Ferrero-Guillén , Javier Díez-González , Rubén Álvarez , Joaquín Torres-Sospedra , Hilde Perez , Adriano Moreira
{"title":"Asynchronous time-based indoor localization systems—Comparative analysis under realistic industrial-oriented conditions","authors":"Rubén Ferrero-Guillén ,&nbsp;Javier Díez-González ,&nbsp;Rubén Álvarez ,&nbsp;Joaquín Torres-Sospedra ,&nbsp;Hilde Perez ,&nbsp;Adriano Moreira","doi":"10.1016/j.adhoc.2025.103816","DOIUrl":"10.1016/j.adhoc.2025.103816","url":null,"abstract":"<div><div>The growing need for accurate localization in increasingly interconnected industrial environments has driven research towards developing new indoor localization systems. This work analyzes and compares three asynchronous localization methods based on the Two-Way-Ranging (TWR) protocol: Single-Sided TWR (SS-TWR), Symmetric Double-Sided TWR (SDS-TWR), and Alternative Double-Sided TWR (AltDS-TWR) in addition to the Asynchronous Time Difference of Arrival (A-TDOA) system. Similar comparisons have been previously reported, however, these only take into consideration clock-associated errors and unrealistic test conditions, thus overlooking the impact of signal paths required by each method, therefore reaching conclusions far from those expected in real applications. In this paper, we propose a more complete and fair comparison among these four asynchronous systems. For this purpose, we propose a clock, noise, and multipath error characterization for each localization system to perform a realistic comparison over multiple industrial scenarios where Autonomous Mobile Robots freely navigate. In order to ensure a fair comparison, a sensor distribution optimization has been carried out for attaining the best achievable performance of each analyzed system. Results show that the selection of the best localization system may depend on the scenario and application conditions as well as the deployment budget. Nevertheless, results from the AltDS-TWR method highlight the potential of this system, yet further research should be conducted to verify the influence of moving targets for this TWR method.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103816"},"PeriodicalIF":4.4,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143619413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remediation of chaos in cognitive Internet of Things sensor network 认知物联网传感器网络混沌修复
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-10 DOI: 10.1016/j.adhoc.2025.103830
Vidyapati Jha, Priyanka Tripathi
{"title":"Remediation of chaos in cognitive Internet of Things sensor network","authors":"Vidyapati Jha,&nbsp;Priyanka Tripathi","doi":"10.1016/j.adhoc.2025.103830","DOIUrl":"10.1016/j.adhoc.2025.103830","url":null,"abstract":"<div><div>The cognitive Internet of Things (CIoT) is an emerging field that integrates cognitive capabilities into IoT systems, enabling devices to learn, reason, and make autonomous decisions. This advancement enhances the intelligence and adaptability of IoT applications. However, the vast, unpredictable, diversified, and time-dependent nature of data generated by these applications presents significant challenges in data management. Without a cognitively inspired framework, effectively managing this complex data becomes increasingly difficult. The behaviour of the data stream should be cognitively assessed in a number of scenarios to ensure that CIoT applications continue to operate smoothly and exhibit non-chaotic behaviour. In order to address it, this research proposes a novel design to detect the chaotic behaviour of the multisensory data stream and further tries to step it up to correct and return from a chaotic state to a non-chaotic state. In the proposed design, the Lyapunov exponent is computed for the detection of chaotic behaviour in the massive heterogeneous data stream, and if the system is found chaotic, then it designs the three novel algorithms, i.e., total variation (TV) regularization, maximum a posteriori (MAP) estimation, and informative value replacement for chaotic sensor data of the system from returning to non-chaotic state. This is done in a computationally efficient manner so that there is no extra burden posed on the fusion center. The suggested algorithm outperforms competing algorithms (accuracy &gt; 99%) in an experimental evaluation, which is carried out utilizing environmental data spanning 21.25 years and uncovered by cross-validation using several measures.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103830"},"PeriodicalIF":4.4,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143680669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing cross-domain data access with decentralized attribute-based access control 使用分散的基于属性的访问控制保护跨域数据访问
IF 4.4 3区 计算机科学
Ad Hoc Networks Pub Date : 2025-03-07 DOI: 10.1016/j.adhoc.2025.103807
Ahmad Salehi Shahraki , Carsten Rudolph , Hooman Alavizadeh , A.S.M. Kayes , Wenny Rahayu , Zahir Tari
{"title":"Securing cross-domain data access with decentralized attribute-based access control","authors":"Ahmad Salehi Shahraki ,&nbsp;Carsten Rudolph ,&nbsp;Hooman Alavizadeh ,&nbsp;A.S.M. Kayes ,&nbsp;Wenny Rahayu ,&nbsp;Zahir Tari","doi":"10.1016/j.adhoc.2025.103807","DOIUrl":"10.1016/j.adhoc.2025.103807","url":null,"abstract":"<div><div>In attribute-based access control (ABAC), access to resources depends on the specific attributes of the entity requesting access. Existing ABAC models primarily depend on local attribute authorities to define and confirm attributes, which makes it challenging to support access decisions cross-domains without introducing centralization. Centralized solutions often conflict with individual domains’ security, privacy, and control requirements and, if compromised for any reason, can impact access to large datasets across participating domains. This paper introduces a novel access control model for cross-domain environments that significantly reduces central control. Our decentralized ABAC (D-ABAC) model uses group signature techniques to exchange attribute information securely and privately within cross-domains. Each domain maintains its own policies and attribute authorities, reducing the need for global trust or centralization to mutual trust between attribute authorities. We further design and implement a proof-of-concept system to demonstrate the practical feasibility of our proposed system for the collaborative and secure sharing of healthcare data in cross-domain environments. The proposed system model enhances security, scalability, and privacy in cross-domain settings, making it suitable for sensitive environments such as healthcare.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"173 ","pages":"Article 103807"},"PeriodicalIF":4.4,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143642191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信