Computer Science, Information Systems

Article Computer Science, Information Systems

Realization of maximum flow in DTN and application in CGR

Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao

Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

UAV-assisted ISAC network physical layer security based on Stackelberg game

Baogang Li, Jia Liao, Xi Gong, Hongyin Xiang, Zhi Yang, Wei Zhao

Summary: This paper addresses the issue of physical layer security in a UAV network and proposes a Stackelberg game model to solve the game problem of information security transmission. The dual optimization theory and KKT conditions are employed to solve the problem. The research demonstrates that the accuracy of location sensing can be effectively measured using the CRB bound while considering Eve's location awareness. The relaxation method and convex optimization tools are used to solve the non-convex optimization problem.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Enabling simulation services for digital twins of 5G/B5G mobile networks

Giovanni Nardini, Giovanni Stea

Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

DINNRS: A Distributed In-Network Name Resolution System for information-centric networks

Zhaolin Ma, Jiali You, Haojiang Deng

Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Accuracy enhancement of Wi-Fi positioning by ranging in dense UWB networks*

Chao-Hsiang Li, Alexander I-Chi Lai, Ruey-Beei Wu

Summary: This study proposes a fusion-based approach that combines Wi-Fi fingerprint positioning with accurate UWB ranging to optimize indoor localization accuracy in dense wireless networks (DWNs). Theoretical analysis and simulation results show that the improvement in localization accuracy is proportional to the square root of the number of participating nodes when at least 6 additional measured distances are available.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices

Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia

Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.

COMPUTER COMMUNICATIONS (2024)

Review Computer Science, Information Systems

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani

Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction

Mubarak Umar, Jiandong Wang, Feng Li, Shuguang Wang, Minggang Zheng, Zhiwei Zhang, Yulong Shen

Summary: This paper proposes a physical layer authentication (PLA) scheme based on Gaussian process (GP) regression, which enhances the reliability of authentication in Internet of Vehicles (IoV) by jointly considering the location and speed attributes of vehicles. The proposed scheme utilizes historical channel state information and transmitters' location and speed information to train a GP model for predicting the next legitimate location and speed for authentication. Experimental results demonstrate that the proposed approach significantly improves authentication performance compared to existing methods.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Self-reconfigurable partial mesh using ZigBee control board towards fail-proof and reliable home area networking

Rakesh Das, Jitendra Nath Bera

Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

On the interest of artificial intelligence approaches in solving the IoT coverage problem

Sami Mnasri, Mansoor Alghamdi

Summary: This survey focuses on the 3D indoor deployment in IoT collection networks, specifically on finding the right locations of IoT connected objects and addressing coverage holes. It analyzes different models and hypotheses presented in the literature, and highlights the use of artificial intelligence techniques such as meta-heuristics, evolutionary optimization, machine learning, and reinforcement learning. The study demonstrates that using these techniques for 3D deployment of IoT networks can enhance the quality of deployment compared to other approaches.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

Ryhan Uddin, Sathish A. P. Kumar, Vinay Chamola

Summary: This paper examines the impact of different types of DoS and DDoS attacks on edge computing layers and investigates existing detection and prevention mechanisms to address security weaknesses. Additionally, a theoretical architecture is proposed to mitigate the impact of distributed denial of service attacks on edge systems.

AD HOC NETWORKS (2024)

Article Computer Science, Information Systems

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning

Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo

Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Pankaj Kumar, Hari Om

Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Role of context in determining transfer of risk knowledge in roundabouts

Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas

Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A consensus model considers managing manipulative and overconfident behaviours in large-scale group decision-making

Xia Liang, Jie Guo, Peide Liu

Summary: This paper investigates a novel consensus model based on social networks to manage manipulative and overconfident behaviors in large-scale group decision-making. By proposing a novel clustering model and improved methods, the consensus reaching is effectively facilitated. The feedback mechanism and management approach are employed to handle decision makers' behaviors. Simulation experiments and comparative analysis demonstrate the effectiveness of the model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Patients' perceptions, experiences, and satisfaction with e-prescribing system: A cross-sectional study

Jahanpour Alipour, Roxana Sharifian, Javid Dehghan Haghighi, Mehrnaz Hashemzehi, Afsaneh Karimi

Summary: This study investigated patients' perceptions of the e-prescribing system. The majority of patients were aware of e-prescribing, and preferred it over traditional prescriptions. Patients reported overall positive satisfaction and relatively positive perceptions and experiences with the e-prescribing system.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Role-aware random walk for network embedding

Hegui Zhang, Gang Kou, Yi Peng, Boyu Zhang

Summary: The proposed RARE method utilizes node role and community information to preserve both node proximity and structural similarity in learned embeddings. Through role-aware random walk and Skip-gram model, node embedding learning is achieved. The CRARE method extends RARE by sampling high-order community members to preserve more structural information of the network.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Simplicity in Eulerian circuits: Uniqueness and safety

Nidia Obscura Acosta, Alexandru I. Tomescu

Summary: This paper presents a new linear-time checkable characterization of directed graphs with a unique Eulerian circuit. The characterization is based on a simple condition of when two edges must appear consecutively in all Eulerian circuits, in terms of cut nodes of the underlying undirected graph of G. Additionally, the paper proposes a method to compute all maximal safe walks appearing in all Eulerian circuits in linear time.

INFORMATION PROCESSING LETTERS (2024)

Article Computer Science, Information Systems

Recursion-free modular arithmetic in the lambda-calculus

Maximilien Mackie

Summary: This research investigates encodings for modular arithmetic in the lambda-calculus. Two approaches are considered: adapting existing numeral systems and creating a new one. The focus of this paper is to provide original techniques for encoding modular arithmetic directly. A modular arithmetic numeral system is presented, complete with multiplication and an implementation of the Chinese remainder theorem, all without recursion i.e., without using fixed-point operators.

INFORMATION PROCESSING LETTERS (2024)