Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2025.111069
Nyi Nyi Linn , Yaodong Ma , Kai Liu , Xiangfen Wang
In vehicular ad hoc networks (VANETs), minimizing the local delay between vehicles and roadside units (RSUs) is crucial for achieving real-time safety communication. In this paper, we propose a hybrid multichannel medium access control (MAC) protocol with low local delay (LLD-HMMAC) that reduces both local delay and transmission overhead by integrating time-division multiple access (TDMA) and carrier-sense multiple access (CSMA) strategies. Firstly, a system model is proposed to estimate the signal strength of the corresponding RSU and neighboring vehicles by dividing vehicle communication range into three concentric circles, i.e. inner circle, outer circle and extending circle. Secondly, we propose a hybrid MAC structure to ensure the prioritized transmission of safety messages and optimize the negotiation processes of non-safety messages. In the CSMA period, we develop a channel dissemination method to mitigate the cumulative collisions caused by the frequent selection of numerous subcarriers and the same transmission batches. Furthermore, we propose a slot identification technique to reduce the probability of channel resource wastage in an RSU entanglement zone. Numerical and simulation results show that compared to existing protocols under different traffic densities, the proposed protocol can achieve substantially lower local delay in both uplink and downlink communications, improve throughput, and decrease the collision rate.
{"title":"A hybrid multichannel MAC protocol with low local delay for vehicular ad hoc networks","authors":"Nyi Nyi Linn , Yaodong Ma , Kai Liu , Xiangfen Wang","doi":"10.1016/j.comnet.2025.111069","DOIUrl":"10.1016/j.comnet.2025.111069","url":null,"abstract":"<div><div>In vehicular ad hoc networks (VANETs), minimizing the local delay between vehicles and roadside units (RSUs) is crucial for achieving real-time safety communication. In this paper, we propose a hybrid multichannel medium access control (MAC) protocol with low local delay (LLD-HMMAC) that reduces both local delay and transmission overhead by integrating time-division multiple access (TDMA) and carrier-sense multiple access (CSMA) strategies. Firstly, a system model is proposed to estimate the signal strength of the corresponding RSU and neighboring vehicles by dividing vehicle communication range into three concentric circles, i.e. inner circle, outer circle and extending circle. Secondly, we propose a hybrid MAC structure to ensure the prioritized transmission of safety messages and optimize the negotiation processes of non-safety messages. In the CSMA period, we develop a channel dissemination method to mitigate the cumulative collisions caused by the frequent selection of numerous subcarriers and the same transmission batches. Furthermore, we propose a slot identification technique to reduce the probability of channel resource wastage in an RSU entanglement zone. Numerical and simulation results show that compared to existing protocols under different traffic densities, the proposed protocol can achieve substantially lower local delay in both uplink and downlink communications, improve throughput, and decrease the collision rate.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"258 ","pages":"Article 111069"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143176533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110979
Shanshan Wang , Chuan Xu , Guofeng Zhao , Zhenzhen Han , Rui Hu , Shui Yu
The rapidly developing Space Ground Integrated Network (SGIN) will provide communication services for massive nodes worldwide, and the authentication protocol is the key step in ensuring the security of SGIN. However, the current authentication schemes rely on security based on discrete logarithms and large integer decomposition problems, which are vulnerable to quantum computing attacks. Meanwhile, the energy and storage capacity of satellites are limited, making it impossible to deploy a highly complex authentication algorithm. Therefore, we propose an anonymous post quantum access authentication scheme based on lattice to meet the security requirements of the SGIN. During the registration phase, an online registration algorithm is developed using the Regev encryption mechanism to securely transmit the entity’s encrypted identity, thereby lowering the storage costs. In the authentication phase, an anonymous authentication algorithm based on the rejection sampling method is proposed to achieve the confidentiality of the private key and identity of the entity through zero-knowledge technology. This approach reduces the computational complexity of the authentication algorithm and decreases the computation time during the authentication phase. Theoretical proof and performance analysis demonstrate that the proposed scheme can resist quantum computation attacks and reduce the computation time by 36% compared to the existing authentication schemes.
{"title":"APQA: An anonymous post quantum access authentication scheme based on lattice for space ground integrated network","authors":"Shanshan Wang , Chuan Xu , Guofeng Zhao , Zhenzhen Han , Rui Hu , Shui Yu","doi":"10.1016/j.comnet.2024.110979","DOIUrl":"10.1016/j.comnet.2024.110979","url":null,"abstract":"<div><div>The rapidly developing Space Ground Integrated Network (SGIN) will provide communication services for massive nodes worldwide, and the authentication protocol is the key step in ensuring the security of SGIN. However, the current authentication schemes rely on security based on discrete logarithms and large integer decomposition problems, which are vulnerable to quantum computing attacks. Meanwhile, the energy and storage capacity of satellites are limited, making it impossible to deploy a highly complex authentication algorithm. Therefore, we propose an anonymous post quantum access authentication scheme based on lattice to meet the security requirements of the SGIN. During the registration phase, an online registration algorithm is developed using the Regev encryption mechanism to securely transmit the entity’s encrypted identity, thereby lowering the storage costs. In the authentication phase, an anonymous authentication algorithm based on the rejection sampling method is proposed to achieve the confidentiality of the private key and identity of the entity through zero-knowledge technology. This approach reduces the computational complexity of the authentication algorithm and decreases the computation time during the authentication phase. Theoretical proof and performance analysis demonstrate that the proposed scheme can resist quantum computation attacks and reduce the computation time by 36% compared to the existing authentication schemes.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110979"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper introduces a novel methodology to enhance privacy in Cooperative Intelligent Transport Systems (C-ITS) by improving unlinkability in vehicle-to-everything (V2X) communication. Focusing on the Cooperative Awareness Basic Service, we employ a Hidden Markov Model (HMM) to model the unlinkability of Cooperative Awareness Messages (CAMs) exchanged between vehicles and roadside units (RSUs) under the surveillance of a Global Passive Adversary (GPA). Implementing a joint obfuscation approach maximizes unlinkability by transforming the CAMs’ original data within a distortion threshold, preserving data utility while confounding the GPA’s ability to reliably link messages to specific vehicles. The experimental evaluation confirms the superiority of our method when compared with multivariate independent noise models, including Gaussian and Laplace. Our approach also incorporates an authentication protocol, ensuring the secure and collaborative execution of the obfuscation algorithm by the vehicles involved.
{"title":"Optimal obfuscation of awareness messages: Improving users’ unlinkability in Intelligent Transport Systems","authors":"Yevhen Zolotavkin , Yurii Baryshev , Jannik Mähn , Vitalii Lukichov , Stefan Köpsell","doi":"10.1016/j.comnet.2024.110972","DOIUrl":"10.1016/j.comnet.2024.110972","url":null,"abstract":"<div><div>This paper introduces a novel methodology to enhance privacy in Cooperative Intelligent Transport Systems (C-ITS) by improving unlinkability in vehicle-to-everything (V2X) communication. Focusing on the Cooperative Awareness Basic Service, we employ a Hidden Markov Model (HMM) to model the unlinkability of Cooperative Awareness Messages (CAMs) exchanged between vehicles and roadside units (RSUs) under the surveillance of a Global Passive Adversary (GPA). Implementing a joint obfuscation approach maximizes unlinkability by transforming the CAMs’ original data within a distortion threshold, preserving data utility while confounding the GPA’s ability to reliably link messages to specific vehicles. The experimental evaluation confirms the superiority of our method when compared with multivariate independent noise models, including Gaussian and Laplace. Our approach also incorporates an authentication protocol, ensuring the secure and collaborative execution of the obfuscation algorithm by the vehicles involved.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110972"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110986
Shuyun Zhang , Huifang Chen , Lei Xie
Due to the high bit error ratio, long propagation delay, low transmission bandwidth and limited energy of sensor nodes, designing an appropriate routing protocol is an important issue in the underwater acoustic sensor network (UASN). In this paper, a service-aware Q-learning-based routing (SAQR) protocol is proposed in the UASN to support the diverse services, as well as achieving an efficient routing. The proposed protocol incorporates four factors in the reward function, and selects the neighboring node with the minimum Q value as the next hop. In addition, a set of candidate forwarding nodes is selected from the neighboring nodes, and a holding time mechanism is addressed to facilitate opportunistic transmission and improve the packet delivery ratio (PDR). Furthermore, a routing void handling mechanism is developed to enhance the reliability of data transmission in the UASN. Simulation results show that the proposed SAQR protocol performs well, in terms of the PDR, the end-to-end delay, the energy efficiency, in the dynamic underwater network environment.
{"title":"Service-aware Q-learning-based routing protocol in the underwater acoustic sensor network","authors":"Shuyun Zhang , Huifang Chen , Lei Xie","doi":"10.1016/j.comnet.2024.110986","DOIUrl":"10.1016/j.comnet.2024.110986","url":null,"abstract":"<div><div>Due to the high bit error ratio, long propagation delay, low transmission bandwidth and limited energy of sensor nodes, designing an appropriate routing protocol is an important issue in the underwater acoustic sensor network (UASN). In this paper, a service-aware <em>Q</em>-learning-based routing (SAQR) protocol is proposed in the UASN to support the diverse services, as well as achieving an efficient routing. The proposed protocol incorporates four factors in the reward function, and selects the neighboring node with the minimum <em>Q</em> value as the next hop. In addition, a set of candidate forwarding nodes is selected from the neighboring nodes, and a holding time mechanism is addressed to facilitate opportunistic transmission and improve the packet delivery ratio (PDR). Furthermore, a routing void handling mechanism is developed to enhance the reliability of data transmission in the UASN. Simulation results show that the proposed SAQR protocol performs well, in terms of the PDR, the end-to-end delay, the energy efficiency, in the dynamic underwater network environment.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110986"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110933
Usman Ali Gulzari , Waqar Farooq , Syed Nasir Mehmood Shah , Iftikhar Ahmed Khan , Sheraz Anjum , Zoran Salcic , Hessam Sarjoughian
This article presents the novel Octagonal-Cross-By-Pass-Mesh (Octa-CBP-Mesh) network topology design for on-chip communication. We have recently presented the cross-by-pass mesh (CBP-Mesh) topology, which outperformed its classed competitors like modified 2-Diamesional-meshes. The effectiveness of the Cross-by-pass links in the CBP-Mesh played a vital role in enhancing the capabilities of the network characteristics and the overall performance of the topology from its competitors. In this study, keeping in view the weaknesses of the CBP-Mesh network, we proposed the Octa-CBP-Mesh network topology, which further improved compared to state-of-the-art predecessors and competitors. The addition of intelligent CBP-Links in Octa-CBP-Mesh design reduces network diameter and improves other network parameters like increasing the bisection-width, path diversity, fault tolerance, and reduces the average number of hops. The synthetic and embedded application traffic traces were applied to the proposed Octa-CBP-Mesh, its predecessors, and its competitor topologies. The simulation results showed that the Octa-CBP-Mesh performed better in terms of network latency and throughput than state-of-the-art topologies with a negligible increase in network energy and power consumption than CBP-Mesh topology only.
{"title":"The octagonal-cross-by-pass-mesh topology design for the on-chip-communication","authors":"Usman Ali Gulzari , Waqar Farooq , Syed Nasir Mehmood Shah , Iftikhar Ahmed Khan , Sheraz Anjum , Zoran Salcic , Hessam Sarjoughian","doi":"10.1016/j.comnet.2024.110933","DOIUrl":"10.1016/j.comnet.2024.110933","url":null,"abstract":"<div><div>This article presents the novel Octagonal-Cross-By-Pass-Mesh (Octa-CBP-Mesh) network topology design for on-chip communication. We have recently presented the cross-by-pass mesh (CBP-Mesh) topology, which outperformed its classed competitors like modified 2-Diamesional-meshes. The effectiveness of the Cross-by-pass links in the CBP-Mesh played a vital role in enhancing the capabilities of the network characteristics and the overall performance of the topology from its competitors. In this study, keeping in view the weaknesses of the CBP-Mesh network, we proposed the Octa-CBP-Mesh network topology, which further improved compared to state-of-the-art predecessors and competitors. The addition of intelligent CBP-Links in Octa-CBP-Mesh design reduces network diameter and improves other network parameters like increasing the bisection-width, path diversity, fault tolerance, and reduces the average number of hops. The synthetic and embedded application traffic traces were applied to the proposed Octa-CBP-Mesh, its predecessors, and its competitor topologies. The simulation results showed that the Octa-CBP-Mesh performed better in terms of network latency and throughput than state-of-the-art topologies with a negligible increase in network energy and power consumption than CBP-Mesh topology only.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110933"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110896
Xinye Wang , Dong Zhao , Xinran Liu , Zhaoxin Zhang , Tianzi Zhao
IP geolocation is crucial in fields such as cybersecurity, e-commerce, and social media. Current mainstream graph neural network methods have advanced localization accuracy by reframing the IP geolocation task as a node regression problem within an attribute graph, leveraging features to model the connectivity between nodes. However, in practical applications, landmarks are often scattered, irregular, and susceptible to outliers, which limits their accuracy due to the unreliability of landmark selection and relationship learning. To address these challenges, this paper introduces a novel IP geolocation model based on graph structure learning, termed NeighborGeo. This model employs reparameterization and supervised contrastive learning to precisely capture and selectively reinforce specific neighbor relationships between nodes in order to optimize structural representations. By accurately capturing and utilizing neighbors, this model achieves accurate predictions. Experimental results demonstrate that, on open-source datasets from New York, Los Angeles, and Shanghai, NeighborGeo achieves significantly higher localization accuracy compared to existing methods, particularly in scenarios with unevenly distributed landmarks.
{"title":"NeighborGeo: IP geolocation based on neighbors","authors":"Xinye Wang , Dong Zhao , Xinran Liu , Zhaoxin Zhang , Tianzi Zhao","doi":"10.1016/j.comnet.2024.110896","DOIUrl":"10.1016/j.comnet.2024.110896","url":null,"abstract":"<div><div>IP geolocation is crucial in fields such as cybersecurity, e-commerce, and social media. Current mainstream graph neural network methods have advanced localization accuracy by reframing the IP geolocation task as a node regression problem within an attribute graph, leveraging features to model the connectivity between nodes. However, in practical applications, landmarks are often scattered, irregular, and susceptible to outliers, which limits their accuracy due to the unreliability of landmark selection and relationship learning. To address these challenges, this paper introduces a novel IP geolocation model based on graph structure learning, termed NeighborGeo. This model employs reparameterization and supervised contrastive learning to precisely capture and selectively reinforce specific neighbor relationships between nodes in order to optimize structural representations. By accurately capturing and utilizing neighbors, this model achieves accurate predictions. Experimental results demonstrate that, on open-source datasets from New York, Los Angeles, and Shanghai, NeighborGeo achieves significantly higher localization accuracy compared to existing methods, particularly in scenarios with unevenly distributed landmarks.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110896"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.111009
Longxia Huang , Changzhi Huo , Chengzhi Ge , Mengmeng Yang
Blockchain technology faces significant scalability challenges, characterized by low throughput and high transaction fees. Off-chain payment channel networks offer a promising solution by enabling faster transaction processing by offloading transactions away from the main blockchain. While existing research has primarily focused on enhancing instantaneous throughput, it often overlooks the critical issue of fund distribution imbalance at either end of the channel following transactions. This imbalance can negatively impact subsequent transactions, leading to reduced long-term throughput. Furthermore, temporary insufficiencies in channel balances may cause transaction requests to fail, further hindering overall payment channel network (PCN) performance. To address these limitations, this paper introduces an adaptive and efficient routing scheme AERO that leverages a balance coefficient to assess fund availability within channels. AERO facilitates optimal transaction path selection while incorporating probabilistic measures to evaluate channel transaction capacity, ensuring adaptive routing with minimal transaction losses and enhancements. Additionally, the proposed transaction scheduling algorithm in AERO incorporates a waiting queue at the transaction node, executing transactions only when the channel’s capacity meets predefined requirements. Simulation results show that under the same network environment, AERO effectively maintains a throughput of approximately 70 even as transaction volumes rapidly increase. Moreover, AERO demonstrates notable cost efficiency, with transaction fees exceeding those of competing schemes by at least 5% in the Lightning topology and 25% in the Ripple topology.
{"title":"AERO: An adaptive and efficient routing for off-chain payment channel networks","authors":"Longxia Huang , Changzhi Huo , Chengzhi Ge , Mengmeng Yang","doi":"10.1016/j.comnet.2024.111009","DOIUrl":"10.1016/j.comnet.2024.111009","url":null,"abstract":"<div><div>Blockchain technology faces significant scalability challenges, characterized by low throughput and high transaction fees. Off-chain payment channel networks offer a promising solution by enabling faster transaction processing by offloading transactions away from the main blockchain. While existing research has primarily focused on enhancing instantaneous throughput, it often overlooks the critical issue of fund distribution imbalance at either end of the channel following transactions. This imbalance can negatively impact subsequent transactions, leading to reduced long-term throughput. Furthermore, temporary insufficiencies in channel balances may cause transaction requests to fail, further hindering overall payment channel network (PCN) performance. To address these limitations, this paper introduces an adaptive and efficient routing scheme AERO that leverages a balance coefficient to assess fund availability within channels. AERO facilitates optimal transaction path selection while incorporating probabilistic measures to evaluate channel transaction capacity, ensuring adaptive routing with minimal transaction losses and enhancements. Additionally, the proposed transaction scheduling algorithm in AERO incorporates a waiting queue at the transaction node, executing transactions only when the channel’s capacity meets predefined requirements. Simulation results show that under the same network environment, AERO effectively maintains a throughput of approximately 70 even as transaction volumes rapidly increase. Moreover, AERO demonstrates notable cost efficiency, with transaction fees exceeding those of competing schemes by at least 5% in the Lightning topology and 25% in the Ripple topology.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 111009"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110984
Adit Sharma, Arash Habibi Lashkari
Encrypted traffic detection and classification is a critical domain in network security, increasingly essential in an era of pervasive encryption. This survey paper delves into integrating advanced Machine Learning (ML) and Deep Learning (DL) techniques to address the challenges of robust encryption methods and dynamic network behaviors. Despite notable advancements, there remains a substantial gap in the operational application of these technologies, often constrained by scalability, efficiency, and adaptability to varied encryption standards. We critically review existing methodologies from 7 surveys and 82 related technical papers, highlight the shortcomings, and propose future research directions. Our analysis underscores the need to develop innovative, resource-efficient models that seamlessly adapt to new threats and encryption techniques without compromising performance. Additionally, we advocate for creating comprehensive datasets that merge encrypted and non-encrypted traffic to enhance model training and testing. This survey maps out the trajectory of recent developments and charts a course for future research that could significantly enhance encrypted traffic management and security capabilities.
{"title":"A survey on encrypted network traffic: A comprehensive survey of identification/classification techniques, challenges, and future directions","authors":"Adit Sharma, Arash Habibi Lashkari","doi":"10.1016/j.comnet.2024.110984","DOIUrl":"10.1016/j.comnet.2024.110984","url":null,"abstract":"<div><div>Encrypted traffic detection and classification is a critical domain in network security, increasingly essential in an era of pervasive encryption. This survey paper delves into integrating advanced Machine Learning (ML) and Deep Learning (DL) techniques to address the challenges of robust encryption methods and dynamic network behaviors. Despite notable advancements, there remains a substantial gap in the operational application of these technologies, often constrained by scalability, efficiency, and adaptability to varied encryption standards. We critically review existing methodologies from 7 surveys and 82 related technical papers, highlight the shortcomings, and propose future research directions. Our analysis underscores the need to develop innovative, resource-efficient models that seamlessly adapt to new threats and encryption techniques without compromising performance. Additionally, we advocate for creating comprehensive datasets that merge encrypted and non-encrypted traffic to enhance model training and testing. This survey maps out the trajectory of recent developments and charts a course for future research that could significantly enhance encrypted traffic management and security capabilities.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110984"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110935
Deyu Zhao , Guang Cheng , Xuan Chen , Yuyu Zhao , Wei Zhang , Lu Lu , Siyuan Zhou , Yuexia Fu
By embedding the state data maintained by the programmable data plane into additional customizable probes, proactive in-band network telemetry (INT) can easily achieve flexible, full-coverage and fine-grained network measurement. However, a significant portion of these probes are invalid, failing to capture meaningful network event information, and instead increasing bandwidth occupancy as well as communication overhead between the control plane and the data plane. Furthermore, these invalid probes exacerbate controller overhead, forcing resource-limited CPUs to perform a large amount of meaningless computation and analysis. In this paper, we propose Probe-Optimizer, a novel framework tailored for proactive INT, which can reduce the introduction of invalid probes to comprehensively lower the various telemetry overheads mentioned above. Technically, Probe-Optimizer assigns a unique importance to each node in the telemetry scenario. The importance is significantly related to the probability of network events occurring, which can be used to select important nodes worth monitoring in the topology over a period of time. Then, Probe-Optimizer generates a dedicated set of probe paths for important nodes and another set for the remaining nodes/links, customizing a more appropriate probe frequency for each probe path. Extensive evaluations on both random and FatTree topologies with different scales are conducted. The results show that Probe-Optimizer introduces significantly fewer invalid probes. Benefiting from this, for the topology with a size of more than 200 nodes, compared to the state-of-art proactive INT methods, Probe-Optimizer achieves a higher proportion of probes carrying network events and at least 13%, 42%, and 26% lower communication overhead, CPU usage, and average bandwidth occupancy, respectively.
{"title":"Probe-Optimizer: Discovering important nodes for proactive in-band network telemetry to achieve better probe orchestration","authors":"Deyu Zhao , Guang Cheng , Xuan Chen , Yuyu Zhao , Wei Zhang , Lu Lu , Siyuan Zhou , Yuexia Fu","doi":"10.1016/j.comnet.2024.110935","DOIUrl":"10.1016/j.comnet.2024.110935","url":null,"abstract":"<div><div>By embedding the state data maintained by the programmable data plane into additional customizable probes, proactive in-band network telemetry (INT) can easily achieve flexible, full-coverage and fine-grained network measurement. However, a significant portion of these probes are invalid, failing to capture meaningful network event information, and instead increasing bandwidth occupancy as well as communication overhead between the control plane and the data plane. Furthermore, these invalid probes exacerbate controller overhead, forcing resource-limited CPUs to perform a large amount of meaningless computation and analysis. In this paper, we propose Probe-Optimizer, a novel framework tailored for proactive INT, which can reduce the introduction of invalid probes to comprehensively lower the various telemetry overheads mentioned above. Technically, Probe-Optimizer assigns a unique importance to each node in the telemetry scenario. The importance is significantly related to the probability of network events occurring, which can be used to select important nodes worth monitoring in the topology over a period of time. Then, Probe-Optimizer generates a dedicated set of probe paths for important nodes and another set for the remaining nodes/links, customizing a more appropriate probe frequency for each probe path. Extensive evaluations on both random and FatTree topologies with different scales are conducted. The results show that Probe-Optimizer introduces significantly fewer invalid probes. Benefiting from this, for the topology with a size of more than 200 nodes, compared to the state-of-art proactive INT methods, Probe-Optimizer achieves a higher proportion of probes carrying network events and at least 13%, 42%, and 26% lower communication overhead, CPU usage, and average bandwidth occupancy, respectively.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110935"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-01DOI: 10.1016/j.comnet.2024.110976
Guy Rozenberg, Michael Segal
In this paper we introduce a new, minimum-cuts based spanner algorithm, when the goal is twofold: (a) to decrease the number of active links in the network and (b) to maintain the ability of the SDN (Software-Defined Networking) controller to perform load balancing. The proposed spanner concept also can be used in order to reduce the running time of the SDN centralized routing algorithm. In addition, we show how to maintain the spanner under dynamic link insertion, deletion and changed weight. The validation of our solution is made through the analysis and simulation that show the superiority of our approach in many cases.
{"title":"Using spanners to improve network performance","authors":"Guy Rozenberg, Michael Segal","doi":"10.1016/j.comnet.2024.110976","DOIUrl":"10.1016/j.comnet.2024.110976","url":null,"abstract":"<div><div>In this paper we introduce a new, minimum-cuts based spanner algorithm, when the goal is twofold: (a) to decrease the number of active links in the network and (b) to maintain the ability of the SDN (Software-Defined Networking) controller to perform load balancing. The proposed spanner concept also can be used in order to reduce the running time of the SDN centralized routing algorithm. In addition, we show how to maintain the spanner under dynamic link insertion, deletion and changed weight. The validation of our solution is made through the analysis and simulation that show the superiority of our approach in many cases.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"257 ","pages":"Article 110976"},"PeriodicalIF":4.4,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143129385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}