首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
DGDPFL: Dynamic Grouping and Privacy Budget Adjustment for Federated Learning in Networked Service Management 网络服务管理中联邦学习的动态分组和隐私预算调整
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-05 DOI: 10.1109/TNSM.2025.3640713
Dongyi Han;Qiang Zhi
In federated learning (FL), effective client and privacy management are crucial for maintaining system efficiency and model performance. However, existing FL frameworks face challenges such as imbalanced client contributions, inefficient resource allocation, and static privacy mechanisms, making scalable client management and adaptive privacy control essential. To address these issues, this paper proposes DGDPFL, a novel FL framework that enhances client selection, resource management, and privacy control through dynamic client grouping and adaptive privacy budgeting. The framework optimizes client management by clustering participants based on device capabilities, bandwidth, and data quality, enabling efficient resource allocation. A contribution-aware selection mechanism ensures fair participation, while a privacy-aware control strategy dynamically adjusts privacy budgets based on model similarity, improving both privacy guarantees and learning performance. We evaluate DGDPFL in real-world and simulated environments. On CIFAR-10 and Fashion-MNIST, DGDPFL achieves 77.83% and 88.35% test accuracy respectively with only 10–20 clients and 40 training rounds, outperforming state-of-the-art baselines by up to 12.36%. On audio datasets FSDD and SAD, the accuracy reaches up to 97%, validating the method’s robustness across modalities. Experimental results demonstrate that DGDPFL outperforms existing approaches by achieving higher model accuracy, improved system efficiency, and better privacy-utility balance. These findings highlight DGDPFL’s effectiveness in managing clients and privacy in FL environments.
在联邦学习(FL)中,有效的客户端和隐私管理对于维护系统效率和模型性能至关重要。然而,现有的FL框架面临着诸如客户端贡献不平衡、资源分配效率低下和静态隐私机制等挑战,这使得可扩展的客户端管理和自适应隐私控制变得必不可少。为了解决这些问题,本文提出了DGDPFL,这是一个新的FL框架,通过动态客户端分组和自适应隐私预算来增强客户端选择,资源管理和隐私控制。该框架通过基于设备功能、带宽和数据质量对参与者进行集群化来优化客户端管理,从而实现高效的资源分配。贡献感知选择机制确保公平参与,隐私感知控制策略基于模型相似度动态调整隐私预算,提高隐私保障和学习性能。我们在真实世界和模拟环境中评估DGDPFL。在CIFAR-10和Fashion-MNIST上,DGDPFL仅在10-20个客户和40轮训练中分别达到77.83%和88.35%的测试准确率,比最先进的基线高出12.36%。在音频数据集FSDD和SAD上,准确率达到97%,验证了该方法跨模态的鲁棒性。实验结果表明,DGDPFL在实现更高的模型精度、提高系统效率和更好的隐私-效用平衡方面优于现有方法。这些发现突出了DGDPFL在FL环境中管理客户端和隐私方面的有效性。
{"title":"DGDPFL: Dynamic Grouping and Privacy Budget Adjustment for Federated Learning in Networked Service Management","authors":"Dongyi Han;Qiang Zhi","doi":"10.1109/TNSM.2025.3640713","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3640713","url":null,"abstract":"In federated learning (FL), effective client and privacy management are crucial for maintaining system efficiency and model performance. However, existing FL frameworks face challenges such as imbalanced client contributions, inefficient resource allocation, and static privacy mechanisms, making scalable client management and adaptive privacy control essential. To address these issues, this paper proposes DGDPFL, a novel FL framework that enhances client selection, resource management, and privacy control through dynamic client grouping and adaptive privacy budgeting. The framework optimizes client management by clustering participants based on device capabilities, bandwidth, and data quality, enabling efficient resource allocation. A contribution-aware selection mechanism ensures fair participation, while a privacy-aware control strategy dynamically adjusts privacy budgets based on model similarity, improving both privacy guarantees and learning performance. We evaluate DGDPFL in real-world and simulated environments. On CIFAR-10 and Fashion-MNIST, DGDPFL achieves 77.83% and 88.35% test accuracy respectively with only 10–20 clients and 40 training rounds, outperforming state-of-the-art baselines by up to 12.36%. On audio datasets FSDD and SAD, the accuracy reaches up to 97%, validating the method’s robustness across modalities. Experimental results demonstrate that DGDPFL outperforms existing approaches by achieving higher model accuracy, improved system efficiency, and better privacy-utility balance. These findings highlight DGDPFL’s effectiveness in managing clients and privacy in FL environments.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1826-1841"},"PeriodicalIF":5.4,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146082054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Energy-Saving Deployment in Large-Scale Heterogeneous Wireless Sensor Networks for Q-Coverage and C-Connectivity: An Efficient Parallel Framework 面向q -覆盖和c -连接的大规模异构无线传感器网络节能部署:一个高效的并行框架
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-04 DOI: 10.1109/TNSM.2025.3640070
Long Chen;Yukang Jiang;Zishang Qiu;Donglin Zhu;Zhiquan Liu;Zhenzhou Tang
Efficient deployment of thousands of energy-constrained sensor nodes (SNs) in large-scale wireless sensor networks (WSNs) is critical for reliable data transmission and target sensing. This study addresses the Minimum Energy Q-Coverage and C-Connectivity (MinEQC) problem for heterogeneous SNs in three-dimensional environments. MnPF (Metaheuristic–Neural Network Parallel Framework), a two-phase method that can embed most metaheuristic algorithms (MAs) and neural networks (NNs), is proposed to address the above problem. Phase-I partitions the monitoring region via divide-and-conquer and applies NN-based dimensionality reduction to accelerate parallel optimization of local Q-coverage and C-connectivity. Phase-II employs an MA-based adaptive restoration strategy to restore connectivity among subregions and systematically assess how different partitioning strategies affect the number of restoration steps. Experiments with four NNs and twelve MAs demonstrate efficiency, scalability, and adaptability of MnPF, while ablation studies confirm the necessity of both phases. MnPF bridges scalability and energy efficiency, providing a generalizable approach to SN deployment in large-scale WSNs.
在大规模无线传感器网络(WSNs)中,高效部署成千上万的能量约束传感器节点(SNs)对于可靠的数据传输和目标感知至关重要。本研究解决了三维环境下异构SNs的最小能量q覆盖和c连通性(MinEQC)问题。为了解决上述问题,提出了一种可嵌入大多数元启发式算法和神经网络的两阶段方法MnPF (meta - heuristic - neural Network Parallel Framework)。第一阶段通过分而治之的方法划分监测区域,并应用基于神经网络的降维,加速局部q覆盖和c连通性的并行优化。第二阶段采用基于ma的自适应恢复策略来恢复子区域之间的连通性,并系统评估不同分区策略对恢复步骤数量的影响。4个神经网络和12个MAs的实验证明了MnPF的效率、可扩展性和适应性,而烧蚀研究证实了这两个阶段的必要性。MnPF在可扩展性和能源效率之间架起了桥梁,为大规模wsn中的SN部署提供了一种通用的方法。
{"title":"Toward Energy-Saving Deployment in Large-Scale Heterogeneous Wireless Sensor Networks for Q-Coverage and C-Connectivity: An Efficient Parallel Framework","authors":"Long Chen;Yukang Jiang;Zishang Qiu;Donglin Zhu;Zhiquan Liu;Zhenzhou Tang","doi":"10.1109/TNSM.2025.3640070","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3640070","url":null,"abstract":"Efficient deployment of thousands of energy-constrained sensor nodes (SNs) in large-scale wireless sensor networks (WSNs) is critical for reliable data transmission and target sensing. This study addresses the Minimum Energy Q-Coverage and C-Connectivity (MinEQC) problem for heterogeneous SNs in three-dimensional environments. MnPF (Metaheuristic–Neural Network Parallel Framework), a two-phase method that can embed most metaheuristic algorithms (MAs) and neural networks (NNs), is proposed to address the above problem. Phase-I partitions the monitoring region via divide-and-conquer and applies NN-based dimensionality reduction to accelerate parallel optimization of local Q-coverage and C-connectivity. Phase-II employs an MA-based adaptive restoration strategy to restore connectivity among subregions and systematically assess how different partitioning strategies affect the number of restoration steps. Experiments with four NNs and twelve MAs demonstrate efficiency, scalability, and adaptability of MnPF, while ablation studies confirm the necessity of both phases. MnPF bridges scalability and energy efficiency, providing a generalizable approach to SN deployment in large-scale WSNs.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1242-1259"},"PeriodicalIF":5.4,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Network Embedding for Data Centers With Composable or Disaggregated Architectures 具有可组合或分解架构的数据中心的虚拟网络嵌入
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-03 DOI: 10.1109/TNSM.2025.3639958
Jiahe Xu;Chao Guo;Moshe Zukerman
Virtual Network Embedding (VNE) is an important problem in network virtualization, involving the optimal allocation of resources from substrate networks to service requests in the form of Virtual Networks (VNs). This paper addresses a specific VNE problem in the context of Composable/Disaggregated Data Center (DDC) networks, characterized by the decoupling and reassembly of different resources into resource pools. Existing research on the VNE problem within Data Center (DC) networks primarily focuses on the Server-based DC (SDC) architecture. In the VNE problem within SDCs, a virtual node is typically mapped to a single server to fulfill its requirements for various resources. However, in the case of DDCs, a virtual node needs to be mapped to different resource nodes for different resources. We aim to design an optimization method to achieve the most efficient VNE within DDCs. To this end, we provide an embedding scheme that acts on each arriving VN request to embed the VN with minimized power consumption. Through this scheme, we demonstrate that we also achieve a high long-term acceptance ratio. We provide Mixed Integer Linear Programming (MILP) and scalable greedy algorithms to implement this scheme. We validate the efficiency of our greedy algorithms by comparing their performance against the MILP for small problems and demonstrate their superiority over baseline algorithms through comprehensive evaluations using both synthetic simulations and real-world Google cluster traces.
虚拟网络嵌入(Virtual Network Embedding, VNE)是网络虚拟化中的一个重要问题,涉及到以虚拟网络(Virtual Network, VNs)形式从底层网络向业务请求提供资源的最优分配。本文解决了可组合/分解数据中心(DDC)网络背景下的一个特定的虚拟网络问题,其特点是将不同的资源解耦并重新组装到资源池中。目前对数据中心(DC)网络中虚拟网问题的研究主要集中在基于服务器的数据中心(SDC)架构上。在sdc中的VNE问题中,虚拟节点通常映射到单个服务器,以满足其对各种资源的需求。但是在ddc的情况下,一个虚拟节点需要映射到不同的资源节点,用于不同的资源。我们的目标是设计一种优化方法来实现ddc内最有效的VNE。为此,我们提供了一种嵌入方案,该方案对每个到达的VN请求起作用,以最小的功耗嵌入VN。通过这个方案,我们证明我们也达到了很高的长期接受率。我们提供了混合整数线性规划(MILP)和可扩展贪婪算法来实现该方案。我们通过将贪心算法的性能与MILP在小问题上的性能进行比较,验证了贪心算法的效率,并通过使用合成模拟和现实世界的谷歌聚类跟踪进行综合评估,证明了它们优于基线算法。
{"title":"Virtual Network Embedding for Data Centers With Composable or Disaggregated Architectures","authors":"Jiahe Xu;Chao Guo;Moshe Zukerman","doi":"10.1109/TNSM.2025.3639958","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3639958","url":null,"abstract":"Virtual Network Embedding (VNE) is an important problem in network virtualization, involving the optimal allocation of resources from substrate networks to service requests in the form of Virtual Networks (VNs). This paper addresses a specific VNE problem in the context of Composable/Disaggregated Data Center (DDC) networks, characterized by the decoupling and reassembly of different resources into resource pools. Existing research on the VNE problem within Data Center (DC) networks primarily focuses on the Server-based DC (SDC) architecture. In the VNE problem within SDCs, a virtual node is typically mapped to a single server to fulfill its requirements for various resources. However, in the case of DDCs, a virtual node needs to be mapped to different resource nodes for different resources. We aim to design an optimization method to achieve the most efficient VNE within DDCs. To this end, we provide an embedding scheme that acts on each arriving VN request to embed the VN with minimized power consumption. Through this scheme, we demonstrate that we also achieve a high long-term acceptance ratio. We provide Mixed Integer Linear Programming (MILP) and scalable greedy algorithms to implement this scheme. We validate the efficiency of our greedy algorithms by comparing their performance against the MILP for small problems and demonstrate their superiority over baseline algorithms through comprehensive evaluations using both synthetic simulations and real-world Google cluster traces.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1276-1296"},"PeriodicalIF":5.4,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Scalability Power of Payment Channel Networks 论支付通道网络的可扩展性
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-03 DOI: 10.1109/TNSM.2025.3640098
Sajjad Alizadeh;Majid Khabbazian
Payment channel networks have great potential to scale cryptocurrency payment systems. However, their scalability power is limited as payments occasionally fail in these networks due to various factors. In this work, we study these factors and analyze their imposing limitations. To this end, we propose a model where a payment channel network is viewed as a compression method. In this model, the compression rate is defined as the ratio of the total number of payments entering the network to the total number of transactions that are placed on the blockchain to handle failed payments or (re)open channels. We analyze the compression rate and its upper limit, referred to as compression capacity, for various payment models, channel-reopening strategies, and network topologies. For networks with a tree topology, we show that the compression rate is inversely proportional to the average path length traversed by payments. For general networks, we show that if payment rates are even slightly asymmetric and channels are not reopened regularly, a constant fraction of payments will always fail regardless of the number of channels, the topology of the network, the routing algorithm used and the amount of allocated funds in the network. We also examine the impact of routing and channel rebalancing on the network’s compression rate. We show that rebalancing and strategic routing can enhance the compression rate in payment channel networks where channels may be reopened, differing from the established literature on credit networks, which suggests these factors do not have an effect.
支付通道网络具有扩展加密货币支付系统的巨大潜力。然而,由于各种因素,支付偶尔会在这些网络中失败,因此它们的可扩展性能力受到限制。在这项工作中,我们研究了这些因素,并分析了它们施加的限制。为此,我们提出了一个模型,其中支付通道网络被视为一种压缩方法。在这个模型中,压缩率被定义为进入网络的支付总数与放置在区块链上处理失败支付或(重新)打开通道的交易总数的比率。我们分析了不同支付模式、通道重开策略和网络拓扑的压缩率及其上限,即压缩容量。对于树形拓扑的网络,我们证明了压缩率与支付所遍历的平均路径长度成反比。对于一般网络,我们表明,如果支付率甚至稍微不对称,并且通道没有定期重新开放,那么无论通道数量、网络拓扑、使用的路由算法和网络中分配的资金数量如何,一定比例的支付总是会失败。我们还研究了路由和通道再平衡对网络压缩率的影响。我们表明,再平衡和战略路由可以提高支付渠道网络中的压缩率,其中通道可能重新开放,这与信用网络的既定文献不同,这表明这些因素没有影响。
{"title":"On Scalability Power of Payment Channel Networks","authors":"Sajjad Alizadeh;Majid Khabbazian","doi":"10.1109/TNSM.2025.3640098","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3640098","url":null,"abstract":"Payment channel networks have great potential to scale cryptocurrency payment systems. However, their scalability power is limited as payments occasionally fail in these networks due to various factors. In this work, we study these factors and analyze their imposing limitations. To this end, we propose a model where a payment channel network is viewed as a compression method. In this model, the compression rate is defined as the ratio of the total number of payments entering the network to the total number of transactions that are placed on the blockchain to handle failed payments or (re)open channels. We analyze the compression rate and its upper limit, referred to as compression capacity, for various payment models, channel-reopening strategies, and network topologies. For networks with a tree topology, we show that the compression rate is inversely proportional to the average path length traversed by payments. For general networks, we show that if payment rates are even slightly asymmetric and channels are not reopened regularly, a constant fraction of payments will always fail regardless of the number of channels, the topology of the network, the routing algorithm used and the amount of allocated funds in the network. We also examine the impact of routing and channel rebalancing on the network’s compression rate. We show that rebalancing and strategic routing can enhance the compression rate in payment channel networks where channels may be reopened, differing from the established literature on credit networks, which suggests these factors do not have an effect.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1342-1355"},"PeriodicalIF":5.4,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145929622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load-Balancing Versus Anycast: A First Look at Operational Challenges 负载平衡与任意播:操作挑战的第一眼
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-25 DOI: 10.1109/TNSM.2025.3636785
Remi Hendriks;Mattijs Jonker;Roland van Rijswijk-Deij;Raffaele Sommese
Load Balancing (LB) is a routing strategy that increases performance by distributing traffic over multiple outgoing paths. In this work, we introduce a novel methodology to detect the influence of LB on anycast routing, which can be used by operators to detect networks that experience anycast site flipping, where traffic from a single client reaches multiple anycast sites. We use our methodology to measure the effects of LB-behavior on anycast routing at a global scale, covering both IPv4 and IPv6. Our results show that LB-induced anycast site flipping is widespread. The results also show our method can detect LB implementations on the global Internet, including detection and classification of Points-of-Presence (PoP) and egress selection techniques deployed by hypergiants, cloud providers, and network operators. We observe LB-induced site flipping directs distinct flows to different anycast sites with significant latency inflation. In cases with two paths between an anycast instance and a load-balanced destination, we observe an average RTT difference of 30 ms with 8% of load-balanced destinations seeing RTT differences of over 100 ms. Being able to detect these cases can help anycast operators significantly improve their service for affected clients.
负载均衡(Load Balancing, LB)是一种路由策略,通过在多条出站路径上分配流量来提高性能。在这项工作中,我们引入了一种新的方法来检测LB对任意播路由的影响,该方法可以被运营商用于检测经历任意播站点翻转的网络,其中来自单个客户端的流量到达多个任意播站点。我们使用我们的方法在全球范围内测量lb行为对任意播路由的影响,包括IPv4和IPv6。我们的研究结果表明,lb诱导的任意位点翻转是普遍存在的。结果还表明,我们的方法可以检测全球互联网上的LB实现,包括超大企业、云提供商和网络运营商部署的存在点(PoP)和出口选择技术的检测和分类。我们观察到lb诱导的站点翻转引导不同的流到不同的任意播站点,具有显著的延迟膨胀。在任意cast实例和负载均衡目的地之间有两条路径的情况下,我们观察到平均RTT差异为30毫秒,其中8%的负载均衡目的地的RTT差异超过100毫秒。能够检测到这些情况可以帮助anycast运营商显著改善他们为受影响客户提供的服务。
{"title":"Load-Balancing Versus Anycast: A First Look at Operational Challenges","authors":"Remi Hendriks;Mattijs Jonker;Roland van Rijswijk-Deij;Raffaele Sommese","doi":"10.1109/TNSM.2025.3636785","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3636785","url":null,"abstract":"Load Balancing (LB) is a routing strategy that increases performance by distributing traffic over multiple outgoing paths. In this work, we introduce a novel methodology to detect the influence of LB on anycast routing, which can be used by operators to detect networks that experience anycast site flipping, where traffic from a single client reaches multiple anycast sites. We use our methodology to measure the effects of LB-behavior on anycast routing at a global scale, covering both IPv4 and IPv6. Our results show that LB-induced anycast site flipping is widespread. The results also show our method can detect LB implementations on the global Internet, including detection and classification of Points-of-Presence (PoP) and egress selection techniques deployed by hypergiants, cloud providers, and network operators. We observe LB-induced site flipping directs distinct flows to different anycast sites with significant latency inflation. In cases with two paths between an anycast instance and a load-balanced destination, we observe an average RTT difference of 30 ms with 8% of load-balanced destinations seeing RTT differences of over 100 ms. Being able to detect these cases can help anycast operators significantly improve their service for affected clients.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"814-823"},"PeriodicalIF":5.4,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Lightweight Key Management Scheme for Secure UAV Swarm Task Allocation 基于区块链的无人机群任务安全分配轻量级密钥管理方案
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-25 DOI: 10.1109/TNSM.2025.3636562
Yaqing Zhu;Liquan Chen;Suhui Liu;Bo Yang;Shang Gao
Uncrewed Aerial Vehicle (UAV) swarms are a cornerstone technology in the rapidly growing low-altitude economy, with significant applications in logistics, smart cities, and emergency response. However, their deployment is constrained by challenges in secure communication, dynamic group coordination, and resource constraints. Although there are various cryptographic techniques, efficient and scalable group key management plays a critical role in secure task allocation in UAV swarms. Existing group key agreement schemes, both symmetric and asymmetric, often fail to adequately address these challenges due to their reliance on centralized control, high computational overhead, sender restrictions, and insufficient protection against physical attacks. To address these issues, we propose PCDCB (Pairing-free Certificateless Dynamic Contributory Broadcast encryption), a blockchain-assisted lightweight key management scheme designed for UAV swarm task allocation. PCDCB is particularly suitable for swarm operations as it supports efficient one-to-many broadcast of task commands, enables dynamic node join/leave, and eliminates key escrow by combining certificateless cryptography with Physical Unclonable Functions (PUFs) for hardware-bound key regeneration. Blockchain is used to maintain tamper-resistant update tables and ensure auditability, while a privacy-preserving mechanism with pseudonyms and a round mapping table provides task anonymity and unlinkability. Comprehensive security analysis confirms that PCDCB is secure and resistant to multiple attacks. Performance evaluation shows that, in large-scale swarm scenarios (n = 100), PCDCB reduces the cost of group key computation by 54.4% (up to 96.9%) and reduces the time to generate the decryption keys by at least 29.7%. In addition, PCDCB achieves the lowest communication cost among all compared schemes and demonstrates strong scalability with increasing group size.
无人机(UAV)群是快速发展的低空经济的基石技术,在物流、智慧城市和应急响应方面有着重要的应用。然而,它们的部署受到安全通信、动态组协调和资源约束等挑战的制约。尽管有各种各样的加密技术,高效和可扩展的组密钥管理在无人机群的安全任务分配中起着至关重要的作用。现有的组密钥协议方案,无论是对称的还是非对称的,往往不能充分解决这些挑战,因为它们依赖于集中控制、高计算开销、发送方限制和对物理攻击的保护不足。为了解决这些问题,我们提出了PCDCB(无配对无证书动态贡献广播加密),这是一种用于无人机群任务分配的区块链辅助轻量级密钥管理方案。PCDCB特别适合于群操作,因为它支持高效的一对多任务命令广播,支持动态节点加入/离开,并且通过将无证书加密与物理不可克隆功能(puf)相结合来实现硬件绑定密钥再生,从而消除了密钥托管。区块链用于维护防篡改更新表并确保可审计性,而带有假名和圆形映射表的隐私保护机制提供任务匿名性和不可链接性。综合安全分析证实PCDCB安全可靠,能够抵御多种攻击。性能评估表明,在大规模群场景(n = 100)中,PCDCB将组密钥计算成本降低了54.4%(最高达96.9%),将解密密钥生成时间减少了至少29.7%。此外,PCDCB在所有比较方案中实现了最低的通信成本,并且随着分组规模的增加显示出较强的可扩展性。
{"title":"Blockchain-Based Lightweight Key Management Scheme for Secure UAV Swarm Task Allocation","authors":"Yaqing Zhu;Liquan Chen;Suhui Liu;Bo Yang;Shang Gao","doi":"10.1109/TNSM.2025.3636562","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3636562","url":null,"abstract":"Uncrewed Aerial Vehicle (UAV) swarms are a cornerstone technology in the rapidly growing low-altitude economy, with significant applications in logistics, smart cities, and emergency response. However, their deployment is constrained by challenges in secure communication, dynamic group coordination, and resource constraints. Although there are various cryptographic techniques, efficient and scalable group key management plays a critical role in secure task allocation in UAV swarms. Existing group key agreement schemes, both symmetric and asymmetric, often fail to adequately address these challenges due to their reliance on centralized control, high computational overhead, sender restrictions, and insufficient protection against physical attacks. To address these issues, we propose PCDCB (Pairing-free Certificateless Dynamic Contributory Broadcast encryption), a blockchain-assisted lightweight key management scheme designed for UAV swarm task allocation. PCDCB is particularly suitable for swarm operations as it supports efficient one-to-many broadcast of task commands, enables dynamic node join/leave, and eliminates key escrow by combining certificateless cryptography with Physical Unclonable Functions (PUFs) for hardware-bound key regeneration. Blockchain is used to maintain tamper-resistant update tables and ensure auditability, while a privacy-preserving mechanism with pseudonyms and a round mapping table provides task anonymity and unlinkability. Comprehensive security analysis confirms that PCDCB is secure and resistant to multiple attacks. Performance evaluation shows that, in large-scale swarm scenarios (n = 100), PCDCB reduces the cost of group key computation by 54.4% (up to 96.9%) and reduces the time to generate the decryption keys by at least 29.7%. In addition, PCDCB achieves the lowest communication cost among all compared schemes and demonstrates strong scalability with increasing group size.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1201-1216"},"PeriodicalIF":5.4,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Deep Learning Models for Real-World ISP Network Traffic Forecasting 深度学习模型在现实ISP网络流量预测中的比较分析
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-25 DOI: 10.1109/TNSM.2025.3636557
Josef Koumar;Timotej Smoleň;Kamil Jeřábek;Tomáš Čejka
Accurate network traffic forecasting is crucial for Internet service providers to optimize resources, improve user experience, and detect anomalies. Until recently, the lack of large-scale, real-world datasets limited the fair evaluation of forecasting methods. The newly released CESNET-TimeSeries24 dataset addresses this gap by providing multivariate traffic data from thousands of devices over 40 weeks at multiple aggregation granularities and hierarchy levels. In this study, we leverage the CESNET-TimeSeries24 dataset to conduct a systematic evaluation of state-of-the-art deep learning models and provide practical insights. Moreover, our analysis reveals trade-offs between prediction accuracy and computational efficiency across different levels of granularity. Beyond model comparison, we establish a transparent and reproducible benchmarking framework, releasing source code and experiments to encourage standardized evaluation and accelerate progress in network traffic forecasting research.
准确的网络流量预测对于互联网服务提供商优化资源、提升用户体验、发现异常等至关重要。直到最近,缺乏大规模的真实数据集限制了对预测方法的公平评估。新发布的CESNET-TimeSeries24数据集通过在多个聚合粒度和层次级别上提供来自数千台设备的超过40周的多变量流量数据,解决了这一差距。在本研究中,我们利用CESNET-TimeSeries24数据集对最先进的深度学习模型进行系统评估,并提供实用的见解。此外,我们的分析揭示了在不同粒度级别上预测精度和计算效率之间的权衡。在模型比较之外,我们建立了一个透明和可复制的基准框架,发布源代码和实验,以鼓励标准化评估,加快网络流量预测研究的进展。
{"title":"Comparative Analysis of Deep Learning Models for Real-World ISP Network Traffic Forecasting","authors":"Josef Koumar;Timotej Smoleň;Kamil Jeřábek;Tomáš Čejka","doi":"10.1109/TNSM.2025.3636557","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3636557","url":null,"abstract":"Accurate network traffic forecasting is crucial for Internet service providers to optimize resources, improve user experience, and detect anomalies. Until recently, the lack of large-scale, real-world datasets limited the fair evaluation of forecasting methods. The newly released CESNET-TimeSeries24 dataset addresses this gap by providing multivariate traffic data from thousands of devices over 40 weeks at multiple aggregation granularities and hierarchy levels. In this study, we leverage the CESNET-TimeSeries24 dataset to conduct a systematic evaluation of state-of-the-art deep learning models and provide practical insights. Moreover, our analysis reveals trade-offs between prediction accuracy and computational efficiency across different levels of granularity. Beyond model comparison, we establish a transparent and reproducible benchmarking framework, releasing source code and experiments to encourage standardized evaluation and accelerate progress in network traffic forecasting research.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"715-728"},"PeriodicalIF":5.4,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Privacy-Preserving 5G Authentication and Key Agreement for Applications (5G-AKMA) in Multi-Access Edge Computing 多接入边缘计算中高效保护隐私的5G身份验证和密钥协议(5G- akma
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-21 DOI: 10.1109/TNSM.2025.3635876
Awaneesh Kumar Yadav;An Braeken
The 5G Authentication and Key Management for Applications (AKMA) protocol is a 5G standard proposed by 3GPP in order to standardize the authentication procedure of mobile users towards applications based on the authentication of the user to the mobile network. As pointed out by several authors, the 5G-AKMA protocol inherently poses severe security issues, including privacy, unlinkability, ephemeral secret leakage and stolen device attacks. Also, the protocol does not offer perfect forward secrecy. In addition, the network operator is able to record all applications to which the user is subscribed and any outsider eavesdropping the communication channel is able to link requests to different applications coming from the same user. While the state of the shows that various protocols are proposed to solve the 5G-AKMA security issues, they are either vulnerable to severe attacks or are computationally extensive. In this paper, we provide a new version of the protocol able to solve these privacy issues in an effective manner. In addition, we also extend the protocol such that it can be used for communications in multi-access edge computing (MEC) applications, taking into account handover procedures from one MEC server to another. The proposed protocol has been thoroughly compared to existing ones, revealing its efficiency in terms of communication, computation, storage, and energy costs. The comparative analysis shows that the proposed 5G-AKMA reduces computational cost by 92%, communication cost by 74%, storage cost by 38%, and energy consumption cost by 58%. The security verification has been conducted using informal and formal methods (Real-Or-Random (ROR) and Scyther Validation tools) to ensure the protocol’s security. Additionally, we conduct a comparative analysis under an unknown attack scenario. Furthermore, the simulation is carried out using NS3.
AKMA (5G Authentication and Key Management for Applications)协议是3GPP提出的5G标准,目的是在用户对移动网络进行认证的基础上,规范移动用户对应用的认证过程。正如几位作者所指出的那样,5G-AKMA协议本身就存在严重的安全问题,包括隐私、不可链接性、短暂的秘密泄露和被盗设备攻击。此外,该协议不提供完美的前向保密。此外,网络运营商能够记录用户订阅的所有应用程序,任何窃听通信通道的外部人员都能够将请求链接到来自同一用户的不同应用程序。虽然目前的状态表明,提出了各种协议来解决5G-AKMA的安全问题,但它们要么容易受到严重攻击,要么计算量太大。在本文中,我们提供了一个新的协议版本,能够有效地解决这些隐私问题。此外,我们还扩展了该协议,以便它可以用于多访问边缘计算(MEC)应用程序中的通信,同时考虑到从一个MEC服务器到另一个MEC服务器的切换过程。该协议与现有协议进行了彻底的比较,揭示了其在通信、计算、存储和能源成本方面的效率。对比分析表明,提出的5G-AKMA降低了92%的计算成本、74%的通信成本、38%的存储成本和58%的能耗成本。使用非正式和正式的方法(Real-Or-Random (ROR)和Scyther验证工具)进行安全验证,以确保协议的安全性。此外,我们在未知的攻击场景下进行了比较分析。在此基础上,采用NS3进行了仿真。
{"title":"Efficient Privacy-Preserving 5G Authentication and Key Agreement for Applications (5G-AKMA) in Multi-Access Edge Computing","authors":"Awaneesh Kumar Yadav;An Braeken","doi":"10.1109/TNSM.2025.3635876","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3635876","url":null,"abstract":"The 5G Authentication and Key Management for Applications (AKMA) protocol is a 5G standard proposed by 3GPP in order to standardize the authentication procedure of mobile users towards applications based on the authentication of the user to the mobile network. As pointed out by several authors, the 5G-AKMA protocol inherently poses severe security issues, including privacy, unlinkability, ephemeral secret leakage and stolen device attacks. Also, the protocol does not offer perfect forward secrecy. In addition, the network operator is able to record all applications to which the user is subscribed and any outsider eavesdropping the communication channel is able to link requests to different applications coming from the same user. While the state of the shows that various protocols are proposed to solve the 5G-AKMA security issues, they are either vulnerable to severe attacks or are computationally extensive. In this paper, we provide a new version of the protocol able to solve these privacy issues in an effective manner. In addition, we also extend the protocol such that it can be used for communications in multi-access edge computing (MEC) applications, taking into account handover procedures from one MEC server to another. The proposed protocol has been thoroughly compared to existing ones, revealing its efficiency in terms of communication, computation, storage, and energy costs. The comparative analysis shows that the proposed 5G-AKMA reduces computational cost by 92%, communication cost by 74%, storage cost by 38%, and energy consumption cost by 58%. The security verification has been conducted using informal and formal methods (Real-Or-Random (ROR) and Scyther Validation tools) to ensure the protocol’s security. Additionally, we conduct a comparative analysis under an unknown attack scenario. Furthermore, the simulation is carried out using NS3.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1874-1890"},"PeriodicalIF":5.4,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memory-Efficient and Hardware-Friendly Sketches for Hierarchical Heavy Hitter Detection 内存高效和硬件友好的分层重磅检测草图
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-21 DOI: 10.1109/TNSM.2025.3635692
Jiachen Liang;Yang Du;He Huang;Yu-E Sun;Guoju Gao;Yonglong Luo
Identifying the hierarchical heavy hitters (HHHs), i.e., the frequent aggregated flows based on common IP prefixes, is a vital task in network traffic measurement and security. Existing methods typically employ dynamic trie structures to track numerous prefixes or utilize multiple separate sketch instances, one for each hierarchical level, to capture HHHs across different levels, while both approaches suffer from low memory efficiency and limited compatibility with programmable switches. In this paper, we introduce two novel HHH detection solutions, respectively, Hierarchical Heavy Detector (HHD) and the Compressed Hierarchical Heavy Detector (CHHD), to achieve high memory efficiency and enhanced hardware compatibility. The key idea of HHD is to design a shared bucket array structure to identify and record HHHs from all hierarchical levels, which avoids the memory wastage of maintaining separate sketches to achieve high memory efficiency and allows feasible deployment of both byte-hierarchy and bit-hierarchy HHH detection on programmable switches using minimal processing stage resources. Additionally, HHD utilizes a sampling-based update strategy to effectively balance packet processing speed and detection accuracy. Furthermore, we present the CHHD, which enhances HHH detection in bit hierarchies through a more compact cell structure, which allows for compressing several ancestor and descendant prefixes within a single cell, further boosting memory efficiency and accuracy. We have implemented HHD and CHHD on a P4-based programmable switch with limited switch resources. Experimental results based on real-world Internet traces demonstrate that HHD and CHHD outperform the state-of-the-art by achieving up to 56 percentage points higher detection precision and $2.6times $ higher throughput.
识别基于通用IP前缀的频繁聚合流是网络流量测量和安全中的一项重要任务。现有的方法通常采用动态trie结构来跟踪大量前缀,或者利用多个单独的草图实例(每个层次一个)来捕获不同级别的HHHs,而这两种方法都存在内存效率低和与可编程开关的兼容性有限的问题。本文介绍了两种新的HHH检测方案,分别是分级重检测器(HHD)和压缩分级重检测器(CHHD),以实现更高的存储效率和增强的硬件兼容性。HHD的关键思想是设计一个共享的桶阵列结构,从所有层次识别和记录HHH,避免了维护单独的草图的内存浪费,以实现高内存效率,并允许在可编程交换机上使用最小的处理阶段资源部署字节层次和位层次的HHH检测。此外,HHD利用基于采样的更新策略来有效地平衡数据包处理速度和检测精度。此外,我们提出了CHHD,它通过更紧凑的单元结构增强了位层次中的HHH检测,该结构允许在单个单元中压缩多个祖先和后代前缀,进一步提高了存储效率和准确性。我们在一个基于p4的可编程交换机上使用有限的交换机资源实现了HHD和CHHD。基于真实互联网痕迹的实验结果表明,HHD和CHHD的检测精度提高了56个百分点,吞吐量提高了2.6倍,超过了最先进的技术。
{"title":"Memory-Efficient and Hardware-Friendly Sketches for Hierarchical Heavy Hitter Detection","authors":"Jiachen Liang;Yang Du;He Huang;Yu-E Sun;Guoju Gao;Yonglong Luo","doi":"10.1109/TNSM.2025.3635692","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3635692","url":null,"abstract":"Identifying the hierarchical heavy hitters (HHHs), i.e., the frequent aggregated flows based on common IP prefixes, is a vital task in network traffic measurement and security. Existing methods typically employ dynamic trie structures to track numerous prefixes or utilize multiple separate sketch instances, one for each hierarchical level, to capture HHHs across different levels, while both approaches suffer from low memory efficiency and limited compatibility with programmable switches. In this paper, we introduce two novel HHH detection solutions, respectively, Hierarchical Heavy Detector (HHD) and the Compressed Hierarchical Heavy Detector (CHHD), to achieve high memory efficiency and enhanced hardware compatibility. The key idea of HHD is to design a shared bucket array structure to identify and record HHHs from all hierarchical levels, which avoids the memory wastage of maintaining separate sketches to achieve high memory efficiency and allows feasible deployment of both byte-hierarchy and bit-hierarchy HHH detection on programmable switches using minimal processing stage resources. Additionally, HHD utilizes a sampling-based update strategy to effectively balance packet processing speed and detection accuracy. Furthermore, we present the CHHD, which enhances HHH detection in bit hierarchies through a more compact cell structure, which allows for compressing several ancestor and descendant prefixes within a single cell, further boosting memory efficiency and accuracy. We have implemented HHD and CHHD on a P4-based programmable switch with limited switch resources. Experimental results based on real-world Internet traces demonstrate that HHD and CHHD outperform the state-of-the-art by achieving up to 56 percentage points higher detection precision and <inline-formula> <tex-math>$2.6times $ </tex-math></inline-formula> higher throughput.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"582-593"},"PeriodicalIF":5.4,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145852533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Energy-Aware Routing via Protozoa Behavior in IoT-Enabled WSNs 物联网无线传感器网络中基于原生动物行为的智能能量感知路由
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-21 DOI: 10.1109/TNSM.2025.3636202
Samayveer Singh;Vikas Tyagi;Aruna Malik;Rajeev Kumar;Ankur;Neeraj Kumar
Energy efficiency and minimization of redundant transmissions are critical challenges in Wireless Sensor Networks (WSNs), especially in heterogeneous IoT environments where sensor nodes (SNs) are resource-constrained and deployed in remote or inaccessible areas. This paper aims to address the dual problem of uneven energy distribution and limited network lifespan by proposing a novel Artificial Protozoa Optimizer-based Cluster Head Selection (APO-CHS) algorithm. The proposed APO-CHS is inspired by the adaptive behavior of Euglena, integrating foraging, dormancy, and reproduction mechanisms to optimize cluster head and relay node selection through a multi-objective fitness function. The function incorporates residual energy, node density, neighbor distance, and energy consumption rate to guide the selection process effectively. Additionally, to tackle communication inefficiency, a lightweight data aggregation scheme is employed. This scheme reduces redundant transmissions by introducing a multi-level aggregation model that eliminates full, partial, and duplicate data in both intra- and inter-cluster communication. The simulation results demonstrate that the proposed framework improves network stability by 29.24%, extends network lifetime by 283.96%, and increases throughput by over 60% compared to baseline methods, thus making it a highly efficient and scalable solution for energy-aware IoT-enabled WSN applications.
能源效率和最小化冗余传输是无线传感器网络(wsn)面临的关键挑战,特别是在异构物联网环境中,传感器节点(SNs)资源受限且部署在偏远或难以到达的地区。针对网络能量分布不均和网络寿命有限的双重问题,提出了一种基于人工原生动物优化器的簇头选择算法(APO-CHS)。本文提出的APO-CHS算法受绿足藻自适应行为的启发,综合了觅食、休眠和繁殖机制,通过多目标适应度函数优化簇头和中继节点的选择。该函数综合了剩余能量、节点密度、邻居距离和能耗率,有效地指导了选择过程。此外,为了解决通信效率低的问题,采用了轻量级的数据聚合方案。该方案通过引入多级聚合模型来消除集群内和集群间通信中的全部、部分和重复数据,从而减少了冗余传输。仿真结果表明,与基准方法相比,该框架提高了29.24%的网络稳定性,延长了283.96%的网络寿命,并将吞吐量提高了60%以上,从而使其成为能源感知物联网WSN应用的高效可扩展解决方案。
{"title":"Intelligent Energy-Aware Routing via Protozoa Behavior in IoT-Enabled WSNs","authors":"Samayveer Singh;Vikas Tyagi;Aruna Malik;Rajeev Kumar;Ankur;Neeraj Kumar","doi":"10.1109/TNSM.2025.3636202","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3636202","url":null,"abstract":"Energy efficiency and minimization of redundant transmissions are critical challenges in Wireless Sensor Networks (WSNs), especially in heterogeneous IoT environments where sensor nodes (SNs) are resource-constrained and deployed in remote or inaccessible areas. This paper aims to address the dual problem of uneven energy distribution and limited network lifespan by proposing a novel Artificial Protozoa Optimizer-based Cluster Head Selection (APO-CHS) algorithm. The proposed APO-CHS is inspired by the adaptive behavior of Euglena, integrating foraging, dormancy, and reproduction mechanisms to optimize cluster head and relay node selection through a multi-objective fitness function. The function incorporates residual energy, node density, neighbor distance, and energy consumption rate to guide the selection process effectively. Additionally, to tackle communication inefficiency, a lightweight data aggregation scheme is employed. This scheme reduces redundant transmissions by introducing a multi-level aggregation model that eliminates full, partial, and duplicate data in both intra- and inter-cluster communication. The simulation results demonstrate that the proposed framework improves network stability by 29.24%, extends network lifetime by 283.96%, and increases throughput by over 60% compared to baseline methods, thus making it a highly efficient and scalable solution for energy-aware IoT-enabled WSN applications.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"23 ","pages":"1960-1969"},"PeriodicalIF":5.4,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1